Re: this article: Flawed outbound packet filtering in various personal firewalls From http://www.hackbusters.net/ob.html : "We are pleased to announce that Sygate Personal Firewall v5.0 has corrected this issue. Sygate has been incredibly responsive and helpful-- they contacted us, they listened, and they got it right. Way to go Sygate! We are also pleased to announce that Look n' Stop 2.03 Beta 01 now also correctly blocks non-winsock packets.The folks who make Look n' Stop were perhaps the first to react with a proposal of how best to handle packets that don't follow the standard winsock "route". Now Kerio Personal Firewall (used to be Tiny Personal Firewall) as of version 2.1.0 correctly blocks non-winsock packets. Kudos to the folks at Kerio" Thus far, we have confirmation that the currently released versions of the following personal firewalls are vulnerable on the listed platforms: AtGuard v3.2 (Win9x) Norton Internet Security (Win2K) Tiny Personal Firewall (Win9x/Win2K) ZoneAlarm and ZoneAlarmPro (Win9x/Win2K)" Is that the latest state of affairs? And how much of a clear and present danger is this vulnerability anyway? Anything known about systems having been compromised in this way?