Vulnerability Description
Teredo clients, when located behind a restricted NAT, allow remote attackers to establish an inbound connection without the guessing required to find a port mapping for a traditional restricted NAT client, by (1) using the client port number contained in the Teredo address or (2) following the bubble-to-open procedure.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Teredo | All versions |
References
- http://www.securityfocus.com/archive/1/452989/100/0/threaded
- http://www.securityfocus.com/archive/1/452996/100/0/threaded
- http://www.symantec.com/avcenter/reference/Teredo_Security.pdf
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17897
- http://www.securityfocus.com/archive/1/452989/100/0/threaded
- http://www.securityfocus.com/archive/1/452996/100/0/threaded
- http://www.symantec.com/avcenter/reference/Teredo_Security.pdf
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17897
FAQ
What is CVE-2006-6265?
CVE-2006-6265 is a vulnerability with a CVSS score of 5.8 (MEDIUM). Teredo clients, when located behind a restricted NAT, allow remote attackers to establish an inbound connection without the guessing required to find a port mapping for a traditional restricted NAT cl...
How severe is CVE-2006-6265?
CVE-2006-6265 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6265?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Teredo.