CVE-2006-6858

Miredo 0.9.8 through 1.0.5 does not properly authenticate a Teredo bubble during UDP hole punching with HMAC-MD5-64 hashing, which allows remote attackers to impersonate an arbitrary Teredo client.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:miredo:miredo:*:*:*:*:*:*:*:*
cpe:2.3:a:miredo:miredo:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:miredo:miredo:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:miredo:miredo:1.0.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:23

Type Values Removed Values Added
References () http://secunia.com/advisories/23596 - Patch, Vendor Advisory () http://secunia.com/advisories/23596 - Patch, Vendor Advisory
References () http://www.simphalempin.com/dev/miredo/mtfl-sa-0604.shtml.en - () http://www.simphalempin.com/dev/miredo/mtfl-sa-0604.shtml.en -
References () http://www.vupen.com/english/advisories/2007/0029 - () http://www.vupen.com/english/advisories/2007/0029 -

Information

Published : 2006-12-31 05:00

Updated : 2025-04-09 00:30


NVD link : CVE-2006-6858

Mitre link : CVE-2006-6858

CVE.ORG link : CVE-2006-6858


JSON object : View

Products Affected

miredo

  • miredo