Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T20:19:35.097Z
Reserved: 2006-12-03T00:00:00
Link: CVE-2006-6263

No data.

Status : Modified
Published: 2006-12-04T11:28:00.000
Modified: 2024-11-21T00:22:17.693
Link: CVE-2006-6263

No data.