Would a remote access filter block virtual cracks (also called secondary connections)? The reason I ask is because of the latest security bulletin involving Internet Explorer (MS02-027) which can be read at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/secur ity/bulletin/ms02-027.asp.
In the FAQ for the bulletin it states: -------------------------------------- Is there anything that can mitigate against this vulnerability? Yes. A successful attack requires that the attacker's server be able to send Gopher traffic to the intended target. Anything which inhibits the attacker's ability to send Gopher traffic would help protect against this vulnerability. Most notably, customers who block access to the Gopher protocol (TCP port 70) at the perimeter firewall would be protected against attempts to exploit this vulnerability across the Internet. -------------------------------------- So I basically need to know if remote access filters supersede virtual cracks. If not, is there anyway to block virtual cracks for the Gopher protocol (i.e. TCP port 70). NOTE: I'm talking about virtual cracks, not connections that are initiated on the external interface of the GNAT Box firewall. Thank You, Brian --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] To subscribe to the digest version first unsubscribe, then e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED] Archive of the last 1000 messages: http://www.mail-archive.com/[email protected]
