Vulnerability Description
Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Niels Provos | Honeyd | 0.5 |
References
- http://secunia.com/advisories/18867Vendor Advisory
- http://www.honeyd.org/adv.2006-01
- http://www.honeyd.org/phpBB2/viewtopic.php?t=106
- http://www.securityfocus.com/archive/1/425112/100/0/threaded
- http://www.securityfocus.com/bid/16595Patch
- http://www.vupen.com/english/advisories/2006/0552
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24728
- http://secunia.com/advisories/18867Vendor Advisory
- http://www.honeyd.org/adv.2006-01
- http://www.honeyd.org/phpBB2/viewtopic.php?t=106
- http://www.securityfocus.com/archive/1/425112/100/0/threaded
- http://www.securityfocus.com/bid/16595Patch
- http://www.vupen.com/english/advisories/2006/0552
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24728
FAQ
What is CVE-2006-0752?
CVE-2006-0752 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simu...
How severe is CVE-2006-0752?
CVE-2006-0752 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0752?
Check the references section above for vendor advisories and patch information. Affected products include: Niels Provos Honeyd.