|
Family: Debian Local Security Checks --> Category: infos
[DSA152] DSA-152-1 l2tpd Vulnerability Scan
Vulnerability Scan Summary DSA-152-1 l2tpd
Detailed Explanation for this Vulnerability Test
Current versions of l2tpd, a layer 2 tunneling client/server program,
forgot to initialize the random generator which made it vulnerable
since all generated random number were 100% guessable. When dealing
with the size of the value in an attribute value pair, too many bytes
were able to be copied, which could lead into the vendor field being
overwritten.
These problems have been fixed in version 0.67-1.1 for the current
stable distribution (woody) and in version 0.68-1 for the unstable
distribution (sid). The old stable distribution (potato) is not
affected, since it doesn't contain the l2tpd package.
We recommend that you upgrade your l2tpd packages.
Solution : http://www.debian.org/security/2002/dsa-152
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|