Описание
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-2095
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14905
- http://marc.info/?l=bugtraq&m=107471181426047&w=2
- http://marc.info/?l=bugtraq&m=107473095118505&w=2
- http://secunia.com/advisories/10694
- http://secunia.com/advisories/10695
- http://www.osvdb.org/3690
- http://www.securityfocus.com/bid/9464
- http://www.securitytracker.com/id?1008818
EPSS
Процентиль: 69%
0.00631
Низкий
CVE ID
Связанные уязвимости
nvd
больше 20 лет назад
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
debian
больше 20 лет назад
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags se ...
EPSS
Процентиль: 69%
0.00631
Низкий