Packdragon,
little more info required on this one.
Firstly is this traffic arriving on you trust interface or unstrusted interface.
Secondly is this a port scan attempt or are you experiencing slow/non existent traffic through the firewall.
You will want to (if this traffic is origination from you internal lan) check the session table (get session) and see what ip the traffic is originating from and what port it is trying to get out on (for blaster it will be 512,1).
Then add a policy to block this traffic (from trust to untrust a.b.c.d ping deny (where a.b.c.d is the client pc causing the problem)) then fix that pc.
If the traffic is arriving on the untrust, you will have to rely on screening and letting as little as possible in.
With regards to blaster, be carefull with any any any policies as they allow a user (in the case of blaster) unwittingly to download it onto their pc. Remember Netscreen devices will permit anything through on a any service as it does not even look at the destination port. Hence nasties like blaster can get into your lan as any traffic or request from an internal source will be permitted.
Hope this helps