First published: Sat Feb 18 2006(Updated: )
Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Niels Provos Honeyd | =1.5a | |
Niels Provos Honeyd | =1.0 | |
Niels Provos Honeyd | =0.5 | |
Niels Provos Honeyd | =0.8b | |
Niels Provos Honeyd | =0.7 | |
Niels Provos Honeyd | =0.8a | |
Niels Provos Honeyd | =0.8 | |
Niels Provos Honeyd | =0.6a | |
Niels Provos Honeyd | =0.6 | |
Niels Provos Honeyd | =0.7a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.