First published: Fri Dec 31 2004(Updated: )
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Niels Provos Honeyd | =0.5 | |
Niels Provos Honeyd | =0.7 | |
Niels Provos Honeyd | =0.6a | |
Niels Provos Honeyd | =0.6 | |
Niels Provos Honeyd | =0.7a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.