George,

after reading the advisory, there's one question I have: If the FW is
configured not to listen on the ports in question (eg. as verified by
nmap), is it still susceptible to this vulnerability?

I want to be certain, before I start bothering our customers...

Thanks
Cheers
Ralf

z+z+z+z+z++z++z+z+z+++z+z++z++z+++z+++z+++z++z+z+z+z++z
Ralf Guenthner, Senior IT Security Consultant
Zentric GmbH & Co. KG  - IT Security & Groupware Solutions
Office Phone:     +49-6101-556060
Fax:       +49-6101-556065
mailto:[EMAIL PROTECTED]
http://www.zentric.com
+z+z+z+z+z++z++z+z+z+++z+z++z++z+++z+++z+++z++z+z+z+z++z



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to