We're running BorderManager 3.7SP2. We recently had a Vulnerability
Assessment done and were informed that the BM server is responding to TCP
packets from a multicast address ('spank' DOS attack). Is this a 'known'
issue with a patch available? All I found on Novell's site was a TID from
3.5 on trouble shooting which explained how IPFLT processes a packet. One
of the things it mentioned was that it checked to ensure the packet was
*not* from a multicast address.

Any insight would be greatly appreciated!