Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=107471181426047&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=107473095118505&w=2 - | |
References | () http://secunia.com/advisories/10694 - | |
References | () http://secunia.com/advisories/10695 - | |
References | () http://www.osvdb.org/3690 - | |
References | () http://www.securityfocus.com/bid/9464 - | |
References | () http://www.securitytracker.com/id?1008818 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/14905 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:52
NVD link : CVE-2004-2095
Mitre link : CVE-2004-2095
CVE.ORG link : CVE-2004-2095
JSON object : View
Products Affected
niels_provos
- honeyd
CWE