[20224] in bugtraq

home help back first fref pref prev next nref lref last post

Re: PIX Firewall 5.1 DoS Vulnerability

daemon@ATHENA.MIT.EDU (Adam Rothschild)
Mon Apr 16 05:10:53 2001

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-ID:  <20010413140015.C24467@og.latency.net>
Date:         Fri, 13 Apr 2001 14:00:15 -0400
Reply-To: Adam Rothschild <asr@LATENCY.NET>
From: Adam Rothschild <asr@LATENCY.NET>
X-To:         Scott Raymond <scott@LINK-NET.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <001901c0c2de$4aaa58e0$f13d0ad1@linknet.com>; from
              scott@LINK-NET.COM on Wed, Apr 11, 2001 at 04:22:33PM -0700

On Wed, Apr 11, 2001 at 04:22:33PM -0700, Scott Raymond wrote:
> By the way, I recently upgraded a PIX 515 at work.  The folks at
> Cisco inform me that the latest software binary image, 5.3.1, is
> broken.  They suggest upgrading to 5.2.5, which has all of the
> updates in 5.3.1, including the elimination of the DoS
> vulnerability.

Interesting; definitely the first I've heard of this.  Do you have any
details of this reported brokenness, or perhaps a Cisco bug ID to
reference?

> It also doesn't hurt to upgrade to fix the duplicate SMTP message
> problem with PIX 4.x.

Indeed.  Running 4.x code in this day and age is generally a bad
thing(TM) for a number of reasons.

-adam

home help back first fref pref prev next nref lref last post