First published: Mon Dec 04 2006(Updated: )
Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Teredo |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6263 is classified as a medium severity vulnerability.
To fix CVE-2006-6263, disable source routing on the Teredo client and ensure that proper security measures are in place on network gateways.
CVE-2006-6263 is caused by Teredo clients recognizing Routing headers in IPv6 packets when source routing is enabled.
CVE-2006-6263 affects Microsoft Teredo clients when source routing functionality is enabled.
CVE-2006-6263 may allow remote attackers to bypass security policies on Internet gateways that drop source-routed packets.