VYPR
Unrated severityNVD Advisory· Published Dec 31, 2004· Updated Apr 16, 2026

CVE-2004-2095

CVE-2004-2095

Description

Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.

Affected products

5
  • cpe:2.3:a:niels_provos:honeyd:0.5:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:niels_provos:honeyd:0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.6a:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.7a:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.