severity 353064 normal
thanks

On Wed, Feb 15, 2006 at 11:46:45PM +0100, Moritz Muehlenhoff wrote:
> Package: honeyd
> Severity: important
> Tags: security
> 
> Quoting from http://www.honeyd.org/adv.2006-01:
> | A bug in the IP reassembly codes causes Honeyd to reply to illegal
> | fragments that other implementations would silently drop.  Watching
> | for replies, it is possible to detect IP addresses simulated by
> | Honeyd.
> 
> There's no CVE yet. Stable is affected according to upstream.

Yes, I'm aware of this issue. It is, however an information leak issue,
hardly an 'important' bug and I don't believe a DSA should be issued for this
issue. Even if it's a honeypot software, being able to detect it by some
(obscure) means does not reduce it usefulness and does not compromise the
honeypot system in any way.

Regards

Javier

Attachment: signature.asc
Description: Digital signature

Reply via email to