Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/425112/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24728 | vdb entry |
http://www.securityfocus.com/bid/16595 | vdb entry patch |
http://secunia.com/advisories/18867 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2006/0552 | vdb entry |
http://www.honeyd.org/phpBB2/viewtopic.php?t=106 | |
http://www.honeyd.org/adv.2006-01 |