Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA530] DSA-530-1 l2tpd


Vulnerability Assessment Details

[DSA530] DSA-530-1 l2tpd

Vulnerability Assessment Summary
DSA-530-1 l2tpd

Detailed Explanation for this Vulnerability Assessment

Thomas Walpuski reported a buffer overflow in l2tpd, an implementation
of the layer 2 tunneling protocol, whereby a remote attacker could
potentially cause arbitrary code to be executed by transmitting a
specially crafted packet. The exploitability of this vulnerability
has not been verified.
For the current stable distribution (woody), this problem has been
fixed in version 0.67-1.2.
For the unstable distribution (sid), this problem has been fixed in
version 0.70-pre20031121-2.
We recommend that you update your l2tpd package.


Solution : http://www.debian.org/security/2004/dsa-530
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Intertel Mitel 5000 580.2000 PM-1 CS 5000 5200 Processor Card w/ AT4GG322 Module
$29.0
Intertel Mitel 5000 580.2000 PM-1 CS 5000 5200 Processor Card w/ AT4GG322 Module pictureIntel Core i5-4300M Processor 3M Cache, up to 3.30 GHz SR1H9
$70.0
Intel Core i5-4300M Processor 3M Cache, up to 3.30 GHz SR1H9  pictureINTEL XEON 2.8GHZ 512 533MHZ FSB CPU PROCESSOR SL6VN
$17.06
INTEL XEON 2.8GHZ 512 533MHZ FSB CPU PROCESSOR SL6VN pictureNEW Genuine Intel Xeon Quad Core E5520 SLBFD 2933MHz 8MB Cache 2.26GHz Processor
$54.9
NEW Genuine Intel Xeon Quad Core E5520 SLBFD 2933MHz 8MB Cache 2.26GHz Processor picture


Discussions

No Discussions have been posted on this vulnerability.