VYPR
Unrated severityNVD Advisory· Published Feb 18, 2006· Updated Apr 16, 2026

CVE-2006-0752

CVE-2006-0752

Description

Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd.

Affected products

10
  • Niels Provos/Honeyd10 versions
    cpe:2.3:a:niels_provos:honeyd:0.5:*:*:*:*:*:*:*+ 9 more
    • cpe:2.3:a:niels_provos:honeyd:0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.6a:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.7a:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.8a:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:0.8b:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:niels_provos:honeyd:1.5a:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.