http://www.checkpoint.com/techsupport/alerts/ipfrag_dos.html

-----Original Message-----
From: Sterling, Chuck [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, 14 June 2000 9:32 AM
To: 'Fw-1-Mailinglist (E-mail)'
Subject: [FW1] Jolt 2
Importance: Low



My apologies if this has already been discussed. I just received this
notice, among others, and would like advice on how to counter this tool, if
possible. If the answers are already in the archives, just point me in the
right direction...

(Security Wire Digest, Vol. 2, No. 22; 12 June) Corporations and firewall
vendors are on high alert following reports about another potentially
destructive denial-of-service (DoS) tool. A recently released DoS tool
called "Jolt 2" can be used to overwhelm a number of popular commercial
firewalls with fragmented IP packets, causing near 100 percent CPU
saturation and possible crashes. As of Friday, only Check Point's FireWall-1
had been publicly confirmed as vulnerable to the Jolt attack. However,
internal tests at security firm ICSA.net proved that at least six other
firewall brands were also vulnerable.



Chuck Sterling
System/Network Administrator
NASA White Sands Test Facility
Magic is REAL, unless declared INTEGER.



============================================================================
====
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
============================================================================
====
***************************************************
This e-mail is  not an  official  statement of  the
Waikato  Regional  Council unless otherwise stated.
Visit our website http://www.ew.govt.nz
***************************************************


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to