CVE-2006-6263

Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:teredo:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/452989/100/0/threaded - () http://www.securityfocus.com/archive/1/452989/100/0/threaded -
References () http://www.securityfocus.com/archive/1/452996/100/0/threaded - () http://www.securityfocus.com/archive/1/452996/100/0/threaded -
References () http://www.symantec.com/avcenter/reference/Teredo_Security.pdf - () http://www.symantec.com/avcenter/reference/Teredo_Security.pdf -

Information

Published : 2006-12-04 11:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6263

Mitre link : CVE-2006-6263

CVE.ORG link : CVE-2006-6263


JSON object : View

Products Affected

microsoft

  • teredo