[20224] in bugtraq
Re: PIX Firewall 5.1 DoS Vulnerability
daemon@ATHENA.MIT.EDU (Adam Rothschild)
Mon Apr 16 05:10:53 2001
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-ID: <20010413140015.C24467@og.latency.net>
Date: Fri, 13 Apr 2001 14:00:15 -0400
Reply-To: Adam Rothschild <asr@LATENCY.NET>
From: Adam Rothschild <asr@LATENCY.NET>
X-To: Scott Raymond <scott@LINK-NET.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <001901c0c2de$4aaa58e0$f13d0ad1@linknet.com>; from
scott@LINK-NET.COM on Wed, Apr 11, 2001 at 04:22:33PM -0700
On Wed, Apr 11, 2001 at 04:22:33PM -0700, Scott Raymond wrote:
> By the way, I recently upgraded a PIX 515 at work. The folks at
> Cisco inform me that the latest software binary image, 5.3.1, is
> broken. They suggest upgrading to 5.2.5, which has all of the
> updates in 5.3.1, including the elimination of the DoS
> vulnerability.
Interesting; definitely the first I've heard of this. Do you have any
details of this reported brokenness, or perhaps a Cisco bug ID to
reference?
> It also doesn't hurt to upgrade to fix the duplicate SMTP message
> problem with PIX 4.x.
Indeed. Running 4.x code in this day and age is generally a bad
thing(TM) for a number of reasons.
-adam