Microsoft

Teredo

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 9.81%
  • Veröffentlicht 04.12.2006 11:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-rou...

  • EPSS 13.02%
  • Veröffentlicht 04.12.2006 11:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Teredo creates trusted peer entries for arbitrary incoming source Teredo addresses, even if the low 32 bits represent an intranet address, which might allow remote attackers to send IPv4 traffic to intranet hosts that use non-RFC1918 addresses, bypas...

  • EPSS 2.95%
  • Veröffentlicht 04.12.2006 11:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Teredo clients, when located behind a restricted NAT, allow remote attackers to establish an inbound connection without the guessing required to find a port mapping for a traditional restricted NAT client, by (1) using the client port number containe...

  • EPSS 17.42%
  • Veröffentlicht 04.12.2006 11:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Teredo clients, when following item 6 of RFC4380 section 5.2.3, start direct IPv6 connectivity tests (aka ping tests) in response to packets from non-Teredo source addresses, which might allow remote attackers to induce Teredo clients to send packets...