ID OSVDB:32551
Type osvdb
Reporter OSVDB
Modified 2006-12-31T06:18:56
Description
Solution Description
Upgrade to version 1.0.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
References:
Vendor URL: http://www.simphalempin.com/dev/miredo/
Vendor Specific News/Changelog Entry: http://anonsvn.remlab.net/svn/miredo/tags/1.0.6/NEWS
Vendor Specific Advisory URL
Secunia Advisory ID:23596
FrSIRT Advisory: ADV-2007-0029
CVE-2006-6858
{"bulletinFamily": "software", "viewCount": 1, "reporter": "OSVDB", "references": [], "description": "## Solution Description\nUpgrade to version 1.0.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor URL: http://www.simphalempin.com/dev/miredo/\nVendor Specific News/Changelog Entry: http://anonsvn.remlab.net/svn/miredo/tags/1.0.6/NEWS\n[Vendor Specific Advisory URL](http://www.simphalempin.com/dev/miredo/mtfl-sa-0604.shtml.en)\n[Secunia Advisory ID:23596](https://secuniaresearch.flexerasoftware.com/advisories/23596/)\nFrSIRT Advisory: ADV-2007-0029\n[CVE-2006-6858](https://vulners.com/cve/CVE-2006-6858)\n", "affectedSoftware": [], "hashmap": [{"key": "affectedSoftware", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "bulletinFamily", "hash": "f9fa10ba956cacf91d7878861139efb9"}, {"key": "cvelist", "hash": "562344df5847f6a65d643851ec9c5d7d"}, {"key": "cvss", "hash": "737e2591b537c46d1ca7ce6f0cea5cb9"}, {"key": "description", "hash": "e057d20c415c93a2d0e97fce8047aa4d"}, {"key": "href", "hash": "c8ddf445f1dcf2d9e2b145cb11336ea2"}, {"key": "modified", "hash": "707ecb90bf8e9a12caabc3e8688cb9f6"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "707ecb90bf8e9a12caabc3e8688cb9f6"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "955b328dc7cd615c13af5464c9183464"}, {"key": "title", "hash": "7cd82e3a5662cb9854b075565d3a34fc"}, {"key": "type", "hash": "1327ac71f7914948578f08c54f772b10"}], "href": "https://vulners.com/osvdb/OSVDB:32551", "modified": "2006-12-31T06:18:56", "objectVersion": "1.2", "enchantments": {"score": {"value": 6.1, "vector": "NONE", "modified": "2017-04-28T13:20:28"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-6858"]}], "modified": "2017-04-28T13:20:28"}, "vulnersScore": 6.1}, "id": "OSVDB:32551", "title": "Miredo Symmetric NAT Teredo Client Spoofing Weakness", "hash": "a3e95018d612a3c26130875e71723b3217294437bfd929a27811c3dc85fe81d5", "edition": 1, "published": "2006-12-31T06:18:56", "type": "osvdb", "history": [], "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "cvelist": ["CVE-2006-6858"], "lastseen": "2017-04-28T13:20:28"}
{"cve": [{"lastseen": "2019-05-29T18:08:35", "bulletinFamily": "NVD", "description": "Miredo 0.9.8 through 1.0.5 does not properly authenticate a Teredo bubble during UDP hole punching with HMAC-MD5-64 hashing, which allows remote attackers to impersonate an arbitrary Teredo client.", "modified": "2011-03-08T02:47:00", "id": "CVE-2006-6858", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-6858", "published": "2006-12-31T05:00:00", "title": "CVE-2006-6858", "type": "cve", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}