Unrated severityNVD Advisory· Published Dec 31, 2004· Updated Apr 16, 2026
CVE-2004-2095
CVE-2004-2095
Description
Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.
Affected products
5cpe:2.3:a:niels_provos:honeyd:0.5:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:niels_provos:honeyd:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:niels_provos:honeyd:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:niels_provos:honeyd:0.6a:*:*:*:*:*:*:*
- cpe:2.3:a:niels_provos:honeyd:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:niels_provos:honeyd:0.7a:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8News mentions
0No linked articles in our index yet.