cvelist/2006/0xxx/CVE-2006-0752.json
2019-03-18 06:43:18 +00:00

92 lines
2.9 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-0752",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20060212 honeyd security advisory: remote detection",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/425112/100/0/threaded"
},
{
"name": "honeyd-ipfrag-obtain-information(24728)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24728"
},
{
"name": "16595",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/16595"
},
{
"name": "18867",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/18867"
},
{
"name": "ADV-2006-0552",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/0552"
},
{
"name": "http://www.honeyd.org/phpBB2/viewtopic.php?t=106",
"refsource": "CONFIRM",
"url": "http://www.honeyd.org/phpBB2/viewtopic.php?t=106"
},
{
"name": "http://www.honeyd.org/adv.2006-01",
"refsource": "CONFIRM",
"url": "http://www.honeyd.org/adv.2006-01"
}
]
}
}