Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-6265

Опубликовано: 04 дек. 2006
Источник: debian
EPSS Низкий

Описание

Teredo clients, when located behind a restricted NAT, allow remote attackers to establish an inbound connection without the guessing required to find a port mapping for a traditional restricted NAT client, by (1) using the client port number contained in the Teredo address or (2) following the bubble-to-open procedure.

Примечания

  • Potential firewall bypass is inherent to tunneling software.

  • Not a bug.

EPSS

Процентиль: 85%
0.02951
Низкий

Связанные уязвимости

nvd
почти 19 лет назад

Teredo clients, when located behind a restricted NAT, allow remote attackers to establish an inbound connection without the guessing required to find a port mapping for a traditional restricted NAT client, by (1) using the client port number contained in the Teredo address or (2) following the bubble-to-open procedure.

github
больше 3 лет назад

Teredo clients, when located behind a restricted NAT, allow remote attackers to establish an inbound connection without the guessing required to find a port mapping for a traditional restricted NAT client, by (1) using the client port number contained in the Teredo address or (2) following the bubble-to-open procedure.

EPSS

Процентиль: 85%
0.02951
Низкий