CVE-2006-0752

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:niels_provos:honeyd:0.5:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.6:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.6a:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.7:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.7a:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.8:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.8a:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.8b:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:1.0:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:1.5a:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://secunia.com/advisories/18867 - Vendor Advisory () http://secunia.com/advisories/18867 - Vendor Advisory
References () http://www.honeyd.org/adv.2006-01 - () http://www.honeyd.org/adv.2006-01 -
References () http://www.honeyd.org/phpBB2/viewtopic.php?t=106 - () http://www.honeyd.org/phpBB2/viewtopic.php?t=106 -
References () http://www.securityfocus.com/archive/1/425112/100/0/threaded - () http://www.securityfocus.com/archive/1/425112/100/0/threaded -
References () http://www.securityfocus.com/bid/16595 - Patch () http://www.securityfocus.com/bid/16595 - Patch
References () http://www.vupen.com/english/advisories/2006/0552 - () http://www.vupen.com/english/advisories/2006/0552 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24728 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24728 -

Information

Published : 2006-02-18 02:02

Updated : 2024-11-21 00:07


NVD link : CVE-2006-0752

Mitre link : CVE-2006-0752

CVE.ORG link : CVE-2006-0752


JSON object : View

Products Affected

niels_provos

  • honeyd