[12162] in bugtraq

home help back first fref pref prev next nref lref last post

Re: NetScreen Brain-deadness...

daemon@ATHENA.MIT.EDU (Dave McPike)
Fri Oct 8 15:50:43 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.GSO.4.05.9910061229460.11903-100000@shell.rmi.net>
Date:         Wed, 6 Oct 1999 12:38:39 -0600
Reply-To: Dave McPike <dmcpike@RMI.NET>
From: Dave McPike <dmcpike@RMI.NET>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <19991005114339.A11911@dragonpaw.org>

While on the subject of Netscreens, v1.62 of the firmware is also
susceptible to an attack identical to the session table flood described
for Checkpoint-1 back in August.  I've talked with Netscreen about this,
and they will have fixes rolled out into the 1.64 release.  They have
patches availble now that they should give out on request.

Dave McPike
Link Consulting, Inc.
dmcpike@rmi.net


"I've met many thinkers and many cats, but the wisdom of cats is
infinitely superior."  --Hippolyte Taine


On Tue, 5 Oct 1999, Ash wrote:

> Just for random value I will mention a change in the NetScreen line of
> firewalls that occured in v1.62 of the firmware.
>
> They disabled the forwarding of non-IP traffic in transparent mode.
>
> Yes, prior to this, if operating as a transparent device, which was
> the default and suggested configuration, the device would forward all
> non-IP packets such as IPX from trusted to untrusted and such.
>
> --
> Ash <ash@dragonpaw.org>
>
> "Knowledge moves at the speed of light; molecules move at 600 miles per hour
>  with FedEx."
>   -- Bill Gross, referring to the Internet
>

home help back first fref pref prev next nref lref last post