A vulnerability has been reported in Miredo, which can be exploited by malicious people to conduct spoofing attacks.
The vulnerability is caused due to an unspecified error in the authentication process of a Teredo Bubble using HMAC-MD5-64 hashing and can be exploited to impersonate an arbitrary Teredo client.
Successful exploitation requires knowledge of the primary IPv4 address of the victim's Teredo server and the victim's Teredo IPv6 address, which is made of the victim's public IPv4 address, the UDP port number, and cone NAT flag.
The vulnerability is reported in versions 0.9.8 through 1.0.5.
Solution: Update to version 1.0.6.
Provided and/or discovered by: Reported by the vendor.
Original Advisory: http://www.simphalempin.com/dev/miredo/mtfl-sa-0604.shtml.en
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org