CVE-2004-2095

Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:niels_provos:honeyd:0.5:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.6:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.6a:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.7:*:*:*:*:*:*:*
cpe:2.3:a:niels_provos:honeyd:0.7a:*:*:*:*:*:*:*

History

No history.

Information

Published : 2004-12-31 05:00

Updated : 2023-12-10 10:17


NVD link : CVE-2004-2095

Mitre link : CVE-2004-2095

CVE.ORG link : CVE-2004-2095


JSON object : View

Products Affected

niels_provos

  • honeyd