WatchGuard Information for VU#222750
TCP/IP implementations do not adequately validate ICMP error messages
- Vendor Information Help Date Notified: 12 Aug 2004
- Statement Date:
- Date Updated: 11 Apr 2005
All WatchGuard firewalls are impacted to some extent by Gont's findings. TCP sessions which terminate on or pass through the firewall are vulnerable to reset attacks when the attacker can guess the source and destination address and port combinations for that session. WatchGuard plans to address the issues raised by Gont's paper for all products in software releases currently scheduled for the Q2-Q3 2005 time frame. If you have further questions about this or any other security concern with WatchGuard products, please contact:
Director, Rapid Response Team
The vendor has not provided us with any further information regarding this vulnerability.
US-CERT has no additional comments at this time.