Peter Grundl has discovered two flaws in the firmware for the Watchguard SOHO firewall. The first is a denial-of-service vulnerability that can be triggered by sending malformed TCP packets to the firewall, causing it to drop and sever all current connections. The second flaw, found in Version 5.0.35 that was released to fix the first problem, could allow certain IP restrictions to be bypassed, depending on the settings imposed by the administrator. To fix both of these problems, users should upgrade to version 5.0.35a of the firmware.
Download the latest update from Watchguard LiveSecurity http://www3.watchguard.com/archive/broadcasts.asp