[20328] in bugtraq
Re: PIX Firewall 5.1 DoS Vulnerability
daemon@ATHENA.MIT.EDU (Snow, Corey)
Thu Apr 19 23:13:04 2001
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Message-ID: <42A757141422D411B6A000104B8D6F4002B53464@skunk.ddpwa.com>
Date: Thu, 19 Apr 2001 08:50:26 -0700
Reply-To: "Snow, Corey" <CSNOW@DDPWA.COM>
From: "Snow, Corey" <CSNOW@DDPWA.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
Following up...
> -----Original Message-----
> From: Scott Raymond [mailto:scott@LINK-NET.COM]
> Sent: Wednesday, April 11, 2001 4:23 PM
> To: BUGTRAQ@SECURITYFOCUS.COM
> Subject: Re: [BUGTRAQ] PIX Firewall 5.1 DoS Vulnerability
>
>
> By the way, I recently upgraded a PIX 515 at work. The folks at Cisco
> inform me that the latest software binary image, 5.3.1, is
> broken. They
> suggest upgrading to 5.2.5, which has all of the updates in 5.3.1,
> including the elimination of the DoS vulnerability.
>
I sent this message on to the guy where I work who manages our PIX Firewalls
and he spent some cycles on the horn with the Cisco tech types- the short
answer is that Cisco told him there were no known DoS attacks against 5.3.1.
According to Cisco, the 5.2.5 release came out *after* 5.3.1 but was
designed for people to move out of the 4.x version of the PIX IOS. 5.3.1
does have a number of known bugs, to be sure, but none that match the
description above.
Corey M. Snow- csnow@ddpwa.com
Senior Web Developer, Washington Dental Service
(206) 528-7361, Mobile (360) 481-2563
FAX: (206) 985-4939
Web: http://www.deltadentalwa.com