|Subject:||question about abuse of state tables.|
|Posted by:||Karl Lovink (ka…@atlovink.net)|
|Date:||Wed, 7 Jan 2004|
My question is: is it possible to use the state table of a stateful
firewall as a source of vulnerability or attack by hackers.
The question is about TCP connection with are already in the state table.
And of course the hacker has no local access to the box.