Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18867 - Vendor Advisory | |
References | () http://www.honeyd.org/adv.2006-01 - | |
References | () http://www.honeyd.org/phpBB2/viewtopic.php?t=106 - | |
References | () http://www.securityfocus.com/archive/1/425112/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16595 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/0552 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24728 - |
Information
Published : 2006-02-18 02:02
Updated : 2024-11-21 00:07
NVD link : CVE-2006-0752
Mitre link : CVE-2006-0752
CVE.ORG link : CVE-2006-0752
JSON object : View
Products Affected
niels_provos
- honeyd
CWE