Search criteria

5 vulnerabilities by niels_provos

CVE-2009-0343 (GCVE-0-2009-0343)

Vulnerability from cvelistv5 – Published: 2009-01-29 19:00 – Updated: 2024-08-07 04:31
VLAI?
Summary
Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2009-01-23 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:31:25.803Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.citi.umich.edu/u/provos/systrace/"
          },
          {
            "name": "20090123 Problems with syscall filtering technologies on Linux",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500377/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://scary.beasts.org/security/CESA-2009-001.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html"
          },
          {
            "name": "33417",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/33417"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-01-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.citi.umich.edu/u/provos/systrace/"
        },
        {
          "name": "20090123 Problems with syscall filtering technologies on Linux",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500377/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://scary.beasts.org/security/CESA-2009-001.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html"
        },
        {
          "name": "33417",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/33417"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0343",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.citi.umich.edu/u/provos/systrace/",
              "refsource": "MISC",
              "url": "http://www.citi.umich.edu/u/provos/systrace/"
            },
            {
              "name": "20090123 Problems with syscall filtering technologies on Linux",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500377/100/0/threaded"
            },
            {
              "name": "http://scary.beasts.org/security/CESA-2009-001.html",
              "refsource": "MISC",
              "url": "http://scary.beasts.org/security/CESA-2009-001.html"
            },
            {
              "name": "http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html",
              "refsource": "MISC",
              "url": "http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html"
            },
            {
              "name": "33417",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/33417"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0343",
    "datePublished": "2009-01-29T19:00:00.000Z",
    "dateReserved": "2009-01-29T00:00:00.000Z",
    "dateUpdated": "2024-08-07T04:31:25.803Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-1030 (GCVE-0-2007-1030)

Vulnerability from cvelistv5 – Published: 2007-02-21 11:00 – Updated: 2024-08-07 12:43
VLAI?
Summary
Niels Provos libevent 1.2 and 1.2a allows remote attackers to cause a denial of service (infinite loop) via a DNS response containing a label pointer that references its own offset.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/24181 third-party-advisoryx_refsource_SECUNIA
http://monkey.org/~provos/libevent/ x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/0647 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/22606 vdb-entryx_refsource_BID
http://osvdb.org/33228 vdb-entryx_refsource_OSVDB
http://securityreason.com/securityalert/2268 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/archive/1/460530/100… mailing-listx_refsource_BUGTRAQ
Date Public ?
2007-02-15 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:43:22.466Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "24181",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24181"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://monkey.org/~provos/libevent/"
          },
          {
            "name": "ADV-2007-0647",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0647"
          },
          {
            "name": "22606",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22606"
          },
          {
            "name": "33228",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/33228"
          },
          {
            "name": "2268",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2268"
          },
          {
            "name": "20070219 Remote DoS in libevent DNS parsing \u003c= 1.2a",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/460530/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-02-15T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Niels Provos libevent 1.2 and 1.2a allows remote attackers to cause a denial of service (infinite loop) via a DNS response containing a label pointer that references its own offset."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "24181",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24181"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://monkey.org/~provos/libevent/"
        },
        {
          "name": "ADV-2007-0647",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0647"
        },
        {
          "name": "22606",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22606"
        },
        {
          "name": "33228",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/33228"
        },
        {
          "name": "2268",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2268"
        },
        {
          "name": "20070219 Remote DoS in libevent DNS parsing \u003c= 1.2a",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/460530/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1030",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Niels Provos libevent 1.2 and 1.2a allows remote attackers to cause a denial of service (infinite loop) via a DNS response containing a label pointer that references its own offset."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "24181",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24181"
            },
            {
              "name": "http://monkey.org/~provos/libevent/",
              "refsource": "CONFIRM",
              "url": "http://monkey.org/~provos/libevent/"
            },
            {
              "name": "ADV-2007-0647",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0647"
            },
            {
              "name": "22606",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22606"
            },
            {
              "name": "33228",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/33228"
            },
            {
              "name": "2268",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2268"
            },
            {
              "name": "20070219 Remote DoS in libevent DNS parsing \u003c= 1.2a",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/460530/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1030",
    "datePublished": "2007-02-21T11:00:00.000Z",
    "dateReserved": "2007-02-20T00:00:00.000Z",
    "dateUpdated": "2024-08-07T12:43:22.466Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4292 (GCVE-0-2006-4292)

Vulnerability from cvelistv5 – Published: 2006-08-22 17:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Unspecified vulnerability in Niels Provos Honeyd before 1.5b allows remote attackers to cause a denial of service (application crash) via certain Address Resolution Protocol (ARP) packets.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2006-08-19 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:06.657Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "honeyd-arp-dos(28480)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28480"
          },
          {
            "name": "ADV-2006-3329",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3329"
          },
          {
            "name": "19614",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19614"
          },
          {
            "name": "21591",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21591"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.honeyd.org/release.php?version=1.5b"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-19T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Niels Provos Honeyd before 1.5b allows remote attackers to cause a denial of service (application crash) via certain Address Resolution Protocol (ARP) packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "honeyd-arp-dos(28480)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28480"
        },
        {
          "name": "ADV-2006-3329",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3329"
        },
        {
          "name": "19614",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19614"
        },
        {
          "name": "21591",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21591"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.honeyd.org/release.php?version=1.5b"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4292",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Niels Provos Honeyd before 1.5b allows remote attackers to cause a denial of service (application crash) via certain Address Resolution Protocol (ARP) packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "honeyd-arp-dos(28480)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28480"
            },
            {
              "name": "ADV-2006-3329",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3329"
            },
            {
              "name": "19614",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19614"
            },
            {
              "name": "21591",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21591"
            },
            {
              "name": "http://www.honeyd.org/release.php?version=1.5b",
              "refsource": "CONFIRM",
              "url": "http://www.honeyd.org/release.php?version=1.5b"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4292",
    "datePublished": "2006-08-22T17:00:00.000Z",
    "dateReserved": "2006-08-22T00:00:00.000Z",
    "dateUpdated": "2024-08-07T19:06:06.657Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0752 (GCVE-0-2006-0752)

Vulnerability from cvelistv5 – Published: 2006-02-18 02:00 – Updated: 2024-08-07 16:48
VLAI?
Summary
Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Date Public ?
2006-02-12 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:48:56.616Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060212 honeyd security advisory: remote detection",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/425112/100/0/threaded"
          },
          {
            "name": "honeyd-ipfrag-obtain-information(24728)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24728"
          },
          {
            "name": "16595",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16595"
          },
          {
            "name": "18867",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18867"
          },
          {
            "name": "ADV-2006-0552",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0552"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.honeyd.org/phpBB2/viewtopic.php?t=106"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.honeyd.org/adv.2006-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-12T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060212 honeyd security advisory: remote detection",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/425112/100/0/threaded"
        },
        {
          "name": "honeyd-ipfrag-obtain-information(24728)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24728"
        },
        {
          "name": "16595",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16595"
        },
        {
          "name": "18867",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18867"
        },
        {
          "name": "ADV-2006-0552",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0552"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.honeyd.org/phpBB2/viewtopic.php?t=106"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.honeyd.org/adv.2006-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0752",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060212 honeyd security advisory: remote detection",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/425112/100/0/threaded"
            },
            {
              "name": "honeyd-ipfrag-obtain-information(24728)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24728"
            },
            {
              "name": "16595",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16595"
            },
            {
              "name": "18867",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18867"
            },
            {
              "name": "ADV-2006-0552",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0552"
            },
            {
              "name": "http://www.honeyd.org/phpBB2/viewtopic.php?t=106",
              "refsource": "CONFIRM",
              "url": "http://www.honeyd.org/phpBB2/viewtopic.php?t=106"
            },
            {
              "name": "http://www.honeyd.org/adv.2006-01",
              "refsource": "CONFIRM",
              "url": "http://www.honeyd.org/adv.2006-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0752",
    "datePublished": "2006-02-18T02:00:00.000Z",
    "dateReserved": "2006-02-18T00:00:00.000Z",
    "dateUpdated": "2024-08-07T16:48:56.616Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-2095 (GCVE-0-2004-2095)

Vulnerability from cvelistv5 – Published: 2005-05-27 04:00 – Updated: 2024-08-08 01:15
VLAI?
Summary
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1008818 vdb-entryx_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/10695 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/3690 vdb-entryx_refsource_OSVDB
http://marc.info/?l=bugtraq&m=107471181426047&w=2 mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/9464 vdb-entryx_refsource_BID
http://marc.info/?l=bugtraq&m=107473095118505&w=2 mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/10694 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2004-01-21 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:15:01.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1008818",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1008818"
          },
          {
            "name": "honeyd-nmap-information-disclosure(14905)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14905"
          },
          {
            "name": "10695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/10695"
          },
          {
            "name": "3690",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/3690"
          },
          {
            "name": "20040121 Honeyd Security Advisory 2004-001: Remote Detection Via Simple Probe Packet",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=107471181426047\u0026w=2"
          },
          {
            "name": "9464",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/9464"
          },
          {
            "name": "20040121 [ GLSA 200401-02 ] Honeyd remote detection vulnerability via a probe packet",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=107473095118505\u0026w=2"
          },
          {
            "name": "10694",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/10694"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-01-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1008818",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1008818"
        },
        {
          "name": "honeyd-nmap-information-disclosure(14905)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14905"
        },
        {
          "name": "10695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/10695"
        },
        {
          "name": "3690",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/3690"
        },
        {
          "name": "20040121 Honeyd Security Advisory 2004-001: Remote Detection Via Simple Probe Packet",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=107471181426047\u0026w=2"
        },
        {
          "name": "9464",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/9464"
        },
        {
          "name": "20040121 [ GLSA 200401-02 ] Honeyd remote detection vulnerability via a probe packet",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=107473095118505\u0026w=2"
        },
        {
          "name": "10694",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/10694"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-2095",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1008818",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1008818"
            },
            {
              "name": "honeyd-nmap-information-disclosure(14905)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14905"
            },
            {
              "name": "10695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/10695"
            },
            {
              "name": "3690",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/3690"
            },
            {
              "name": "20040121 Honeyd Security Advisory 2004-001: Remote Detection Via Simple Probe Packet",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=107471181426047\u0026w=2"
            },
            {
              "name": "9464",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/9464"
            },
            {
              "name": "20040121 [ GLSA 200401-02 ] Honeyd remote detection vulnerability via a probe packet",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=107473095118505\u0026w=2"
            },
            {
              "name": "10694",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/10694"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-2095",
    "datePublished": "2005-05-27T04:00:00.000Z",
    "dateReserved": "2005-05-27T00:00:00.000Z",
    "dateUpdated": "2024-08-08T01:15:01.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}