"If a continuous stream of fragmented IP datagrams with a particular
malformation were sent to an affected machine...."
Do we know for sure if Gauntlet (plug or proxy) or Checkpoint (stateful
inspection) can block this vulnerability?
Thanks!
Steve
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================