Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA530] DSA-530-1 l2tpd

Vulnerability Assessment Details

[DSA530] DSA-530-1 l2tpd

Vulnerability Assessment Summary
DSA-530-1 l2tpd

Detailed Explanation for this Vulnerability Assessment

Thomas Walpuski reported a buffer overflow in l2tpd, an implementation
of the layer 2 tunneling protocol, whereby a remote attacker could
potentially cause arbitrary code to be executed by transmitting a
specially crafted packet. The exploitability of this vulnerability
has not been verified.
For the current stable distribution (woody), this problem has been
fixed in version 0.67-1.2.
For the unstable distribution (sid), this problem has been fixed in
version 0.70-pre20031121-2.
We recommend that you update your l2tpd package.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

lenovo yoga 710-15isk 80u0 | 15.6" 2-in-1 Laptop intel i5 256GB M.2 Touch - #283
lenovo yoga 710-15isk 80u0 | 15.6Lenovo 100S-14IBR 14" Laptop Intel Celeron 2GB Memory 32GB eMMC - Silver - #303
Lenovo 100S-14IBR 14Lenovo Ideapad110-17IKB 80VK003KUS 17.3" i5-7200U 2.50GHz 8GB/1TB HDD Win10 #307
Lenovo Ideapad110-17IKB 80VK003KUS 17.3LENOVO IDEAPAD 110-15ISK (80UD) INTEL i3-6100U 2.3GHz 4GB 1TB 15.6" - #422
LENOVO IDEAPAD 110-15ISK (80UD) INTEL i3-6100U 2.3GHz 4GB 1TB 15.6


No Discussions have been posted on this vulnerability.