"If a continuous stream of fragmented IP datagrams with a particular
malformation were sent to an affected machine...."

Do we know for sure if Gauntlet (plug or proxy) or Checkpoint (stateful
inspection) can block this vulnerability?

Thanks!
Steve




================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to