2 results (0.024 seconds)

CVSS: 5.0EPSS: 1%CPEs: 10EXPL: 0

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd. • http://secunia.com/advisories/18867 http://www.honeyd.org/adv.2006-01 http://www.honeyd.org/phpBB2/viewtopic.php?t=106 http://www.securityfocus.com/archive/1/425112/100/0/threaded http://www.securityfocus.com/bid/16595 http://www.vupen.com/english/advisories/2006/0552 https://exchange.xforce.ibmcloud.com/vulnerabilities/24728 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd. • http://marc.info/?l=bugtraq&m=107471181426047&w=2 http://marc.info/?l=bugtraq&m=107473095118505&w=2 http://secunia.com/advisories/10694 http://secunia.com/advisories/10695 http://www.osvdb.org/3690 http://www.securityfocus.com/bid/9464 http://www.securitytracker.com/id?1008818 https://exchange.xforce.ibmcloud.com/vulnerabilities/14905 •