@jimp:
Did you read the link they gave? That is a vulnerability on Caldera OpenLinux which has nothing to do with FreeBSD, on which pfSense is based. Completely different worlds, and completely different network stacks. Not to mention that was a specific flaw in a specific version of Caldera, by SCO, and no others.
It should be enough to tell them that you are not running the vulnerable platform, and that it is a false positive.
I explained that in detail and they rejected my response. It's definitely a false positive. Their exact verbiage says that 'only "established" connections are allowed into the network.'
I'd like to know just how connections are ever supposed to become established if you don't allow SYN packets through? I don't think this company even understands what a three-way handshake actually is.
I hope pfsense 2.0 will allow us to filter on tcp flags. I can imagine other uses for this too.