Описание
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-2095
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14905
- http://marc.info/?l=bugtraq&m=107471181426047&w=2
- http://marc.info/?l=bugtraq&m=107473095118505&w=2
- http://secunia.com/advisories/10694
- http://secunia.com/advisories/10695
- http://www.osvdb.org/3690
- http://www.securityfocus.com/bid/9464
- http://www.securitytracker.com/id?1008818
EPSS
Процентиль: 69%
0.00631
Низкий
CVE ID
Связанные уязвимости
nvd
почти 21 год назад
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
debian
почти 21 год назад
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags se ...
EPSS
Процентиль: 69%
0.00631
Низкий