Check Point Firewall-1 Fragmented...

- AV AC AU C I A
发布: 2000-06-06
修订: 2025-04-13

By sending illegally fragmented packets directly to or routed through Check Point FireWall-1, it is possible to force the firewall to use 100% of available processor time logging these packets. The FireWall-1 rulebase cannot prevent this attack and it is not logged in the firewall logs.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息