Vulnerability Description
Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Teredo | All versions |
References
- http://www.securityfocus.com/archive/1/452989/100/0/threaded
- http://www.securityfocus.com/archive/1/452996/100/0/threaded
- http://www.symantec.com/avcenter/reference/Teredo_Security.pdf
- http://www.securityfocus.com/archive/1/452989/100/0/threaded
- http://www.securityfocus.com/archive/1/452996/100/0/threaded
- http://www.symantec.com/avcenter/reference/Teredo_Security.pdf
FAQ
What is CVE-2006-6263?
CVE-2006-6263 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of ...
How severe is CVE-2006-6263?
CVE-2006-6263 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6263?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Teredo.