George,
after reading the advisory, there's one question I have: If the FW is
configured not to listen on the ports in question (eg. as verified by
nmap), is it still susceptible to this vulnerability?
I want to be certain, before I start bothering our customers...
Thanks
Cheers
Ralf
z+z+z+z+z++z++z+z+z+++z+z++z++z+++z+++z+++z++z+z+z+z++z
Ralf Guenthner, Senior IT Security Consultant
Zentric GmbH & Co. KG - IT Security & Groupware Solutions
Office Phone: +49-6101-556060
Fax: +49-6101-556065
mailto:[EMAIL PROTECTED]
http://www.zentric.com
+z+z+z+z+z++z++z+z+z+++z+z++z++z+++z+++z+++z++z+z+z+z++z
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================