{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-11-29T00:00:00.000Z","descriptions":[{"lang":"en","value":"Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-17T20:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"http://www.symantec.com/avcenter/reference/Teredo_Security.pdf"},{"name":"20061129 Re: [Full-disclosure] New report on Teredo security","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/452996/100/0/threaded"},{"name":"20061129 New report on Teredo security","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/452989/100/0/threaded"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-6263","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Teredo clients, when source routing is enabled, recognize a Routing header in an encapsulated IPv6 packet and send the packet to the next hop, which might allow remote attackers to bypass policies of certain Internet gateways that drop all source-routed packets."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://www.symantec.com/avcenter/reference/Teredo_Security.pdf","refsource":"MISC","url":"http://www.symantec.com/avcenter/reference/Teredo_Security.pdf"},{"name":"20061129 Re: [Full-disclosure] New report on Teredo security","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/452996/100/0/threaded"},{"name":"20061129 New report on Teredo security","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/452989/100/0/threaded"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T20:19:35.097Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.symantec.com/avcenter/reference/Teredo_Security.pdf"},{"name":"20061129 Re: [Full-disclosure] New report on Teredo security","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/452996/100/0/threaded"},{"name":"20061129 New report on Teredo security","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/452989/100/0/threaded"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-6263","datePublished":"2006-12-04T11:00:00.000Z","dateReserved":"2006-12-03T00:00:00.000Z","dateUpdated":"2024-08-07T20:19:35.097Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}