Alcatel Information for VU#539363

State-based firewalls fail to effectively manage session table resource exhaustion

Status

Affected

Vendor Statement

In relation to this note on security vulnerabilities in various state-based firewall implementations, it is first important to realize that the attacks mentioned in this note cannot be fully countered but appropriate and sound engineering designs can mitigate them. Alcatel has taken such appropriate measures to ensure that our products, in particular the OmniAccess 200 series, are correctly designed.

Customers may contact their Alcatel support representative for more details. The security of our customers' networks is of highest priority for Alcatel. Therefore we continue to test our product portfolio against these potential security vulnerabilities in our products and will provide updates if necessary.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.