Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Link | Tags |
---|---|
http://www.securitytracker.com/id?1008818 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/14905 | vdb entry |
http://secunia.com/advisories/10695 | third party advisory |
http://www.osvdb.org/3690 | vdb entry |
http://marc.info/?l=bugtraq&m=107471181426047&w=2 | mailing list |
http://www.securityfocus.com/bid/9464 | vdb entry |
http://marc.info/?l=bugtraq&m=107473095118505&w=2 | mailing list |
http://secunia.com/advisories/10694 | third party advisory |