CVE-2004-2095
CVSS5.0
发布时间 :2004-12-31 00:00:00
修订时间 :2016-10-17 23:06:04
NMCOS    

[原文]Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd.


[CNNVD]Honeyd远程虚拟主机监测漏洞(CNNVD-200412-1104)

        Honeyd 0.8之前的版本答复设置SYN和RST标志位的TCP数据包时存在漏洞。远程攻击者可以辨别Honeyd模拟的IP地址。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:niels_provos:honeyd:0.7a
cpe:/a:niels_provos:honeyd:0.6a
cpe:/a:niels_provos:honeyd:0.6
cpe:/a:niels_provos:honeyd:0.7
cpe:/a:niels_provos:honeyd:0.5

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2095
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2095
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-1104
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=107471181426047&w=2
(UNKNOWN)  BUGTRAQ  20040121 Honeyd Security Advisory 2004-001: Remote Detection Via Simple Probe Packet
http://marc.info/?l=bugtraq&m=107473095118505&w=2
(UNKNOWN)  BUGTRAQ  20040121 [ GLSA 200401-02 ] Honeyd remote detection vulnerability via a probe packet
http://www.securityfocus.com/bid/9464
(UNKNOWN)  BID  9464
http://www.securitytracker.com/id?1008818
(UNKNOWN)  SECTRACK  1008818
http://xforce.iss.net/xforce/xfdb/14905
(UNKNOWN)  XF  honeyd-nmap-information-disclosure(14905)

- 漏洞信息

Honeyd远程虚拟主机监测漏洞
中危 设计错误
2004-12-31 00:00:00 2006-08-31 00:00:00
远程  
        Honeyd 0.8之前的版本答复设置SYN和RST标志位的TCP数据包时存在漏洞。远程攻击者可以辨别Honeyd模拟的IP地址。

- 公告与补丁

        Gentoo has released updates to address this issue. These updates may be applied with the following commands:
        emerge sync
        emerge -pv ">=net-analyzer/honeyd-0.8"
        emerge ">=net-analyzer/honeyd-0.8"
        This issue has been addressed with the release of Honeyd 0.8.
        Honeyd Honeyd 0.5
        
        Honeyd Honeyd 0.6 a
        
        Honeyd Honeyd 0.6
        
        Honeyd Honeyd 0.7
        
        Honeyd Honeyd 0.7 a
        

- 漏洞信息

3690
Honeyd TCP Flag Remote Identification
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

Honeyd contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when an attacker uses a scanner such as NMAP to fingerprint a remote host. Honeyd will reply to such a probe with both the SYN and RST flags set which discloses the presence of the software, essentially defeating the purpose of it.

- 时间线

2004-01-22 Unknow
2004-01-22 Unknow

- 解决方案

Upgrade to version 0.8 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Honeyd Remote Virtual Host Detection Vulnerability
Design Error 9464
Yes No
2004-01-18 12:00:00 2009-07-12 02:06:00
Discovery of this issue is credited to Joseph Corey.

- 受影响的程序版本

Honeyd Honeyd 0.7 a
Honeyd Honeyd 0.7
Honeyd Honeyd 0.6 a
Honeyd Honeyd 0.6
Honeyd Honeyd 0.5
Honeyd Honeyd 0.8

- 不受影响的程序版本

Honeyd Honeyd 0.8

- 漏洞讨论

Honeyd is prone to a vulnerability that may permit remote users to detect the presence of virtual hosts spawned by the server. This is due to a flaw in how Honeyd responds to certain TCP packets, effectively allowing a remote user to determine if a scanned address is a virtual Honeyd host. The consequence is that a remote attacker could enumerate the existence of simulated Honeyd hosts and then either target specific attacks against these hosts or avoid them altogether.

- 漏洞利用

A patch to the scanrand tool included in the Paketto Keiretsu scanning tool has been publicized that detects Honeyd virtual hosts.

- 解决方案

Gentoo has released updates to address this issue. These updates may be applied with the following commands:

emerge sync
emerge -pv ">=net-analyzer/honeyd-0.8"
emerge ">=net-analyzer/honeyd-0.8"

This issue has been addressed with the release of Honeyd 0.8.


Honeyd Honeyd 0.5

Honeyd Honeyd 0.6 a

Honeyd Honeyd 0.6

Honeyd Honeyd 0.7

Honeyd Honeyd 0.7 a

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站