Description
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Product(s):
- Niels Provos Honeyd 0.5
- Niels Provos Honeyd 0.6
- Niels Provos Honeyd 0.6a
- Niels Provos Honeyd 0.7
- Niels Provos Honeyd 0.7a
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-2095, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-2095 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.