Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/452989/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/452996/100/0/threaded - | |
References | () http://www.symantec.com/avcenter/reference/Teredo_Security.pdf - |
Information
Published : 2006-12-04 11:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6263
Mitre link : CVE-2006-6263
CVE.ORG link : CVE-2006-6263
JSON object : View
Products Affected
microsoft
- teredo
CWE