<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SegmentSmack and FragmentSmack - sk134253 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19849#M3686</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Check Point for responding to this so quickly.&lt;/P&gt;&lt;P&gt;Awaiting updated Jumbo Hotfix Takes soon to solve the issue asap.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Aug 2018 20:26:42 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2018-08-16T20:26:42Z</dc:date>
    <item>
      <title>SegmentSmack and FragmentSmack - sk134253</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19848#M3685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're using a perimeter Security Gateway, then you should read the &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk134253"&gt;sk134253 - Check Point response to SegmentSmack (CVE-2018-5390) and FragmentSmack (CVE-2018-5391)&lt;/A&gt;&amp;nbsp;and patch your device!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2018 19:06:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19848#M3685</guid>
      <dc:creator>NaderAlly</dc:creator>
      <dc:date>2018-08-16T19:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: SegmentSmack and FragmentSmack - sk134253</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19849#M3686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Check Point for responding to this so quickly.&lt;/P&gt;&lt;P&gt;Awaiting updated Jumbo Hotfix Takes soon to solve the issue asap.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2018 20:26:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19849#M3686</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-08-16T20:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: SegmentSmack and FragmentSmack - sk134253</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19850#M3687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The hotfix is already available on CPUSE and is a recommended update - this is also mentioned In the SmartConsole in the Gateways &amp;amp; Servers tab.&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/68947_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/68946_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Yonatan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2018 09:12:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19850#M3687</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-08-17T09:12:14Z</dc:date>
    </item>
    <item>
      <title>Re: SegmentSmack and FragmentSmack - sk134253</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19851#M3688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm, still running R77.30 and below jumbo hotfix 317. Does anyone know if this hotfix will be released or a workaround where 317 is not required as part of installing this hotfix?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2018 17:29:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19851#M3688</guid>
      <dc:creator>J_7584</dc:creator>
      <dc:date>2018-08-17T17:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: SegmentSmack and FragmentSmack - sk134253</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19852#M3689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you tried to contact CP support? Based on their statement for R77.30 Jumbo HF Take lower than 317 -&amp;nbsp;&lt;EM style="background-color: #ffffff; color: #000000; font-size: 14px;"&gt;Check Point recommends to update to&amp;nbsp;the latest&amp;nbsp;Jumbo Hotfix Accumulator Take and install the Hotfix&lt;/EM&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt; &lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;or&amp;nbsp;&lt;/SPAN&gt;contact Check Point Support&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2018 17:52:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19852#M3689</guid>
      <dc:creator>NaderAlly</dc:creator>
      <dc:date>2018-08-17T17:52:29Z</dc:date>
    </item>
    <item>
      <title>Re: SegmentSmack and FragmentSmack - sk134253</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19853#M3690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you provide more info on this from &lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk134253?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;"SegmentSmack could only be applied on a connection with protection that requires Active Steaming (SSL Inspection, Check Point Proxy, VoIP, Header Spoofing) and either this TCP connection is allowed to the internal network or local user is tricked to connect to a remote malicious server."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;What does this mean?&amp;nbsp; Are you saying there is a risk of a successful connection that will not be detected by SSL inspection?&amp;nbsp; Can you please state what could happen with certainty?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Dan Roddy&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2018 14:58:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SegmentSmack-and-FragmentSmack-sk134253/m-p/19853#M3690</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2018-08-20T14:58:37Z</dc:date>
    </item>
  </channel>
</rss>

