Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-0752

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2006-0752
Last Modified 07 Mar 2011 09:30:45
Published 17 Feb 2006 09:02:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-0752

Summary

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.

Vulnerable Systems

Application

  • Niels Provos Honeyd 0.5

  • Niels Provos Honeyd 0.6

  • Niels Provos Honeyd 0.6a

  • Niels Provos Honeyd 0.7

  • Niels Provos Honeyd 0.7a

  • Niels Provos Honeyd 0.8

  • Niels Provos Honeyd 0.8a

  • Niels Provos Honeyd 0.8b

  • Niels Provos Honeyd 1.0

  • Niels Provos Honeyd 1.5a


References

BID - 16595

VUPEN - ADV-2006-0552

BUGTRAQ - 20060212 honeyd security advisory: remote detection

CONFIRM - http://www.honeyd.org/phpBB2/viewtopic.php?t=106

CONFIRM - http://www.honeyd.org/adv.2006-01

SECUNIA - 18867

XF - honeyd-ipfrag-obtain-information(24728)


Last Updated: 27 May 2016 10:41:46