Gentoo Archives: gentoo-announce

From: Kurt Lieber <klieber@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200407-17 ] l2tpd: Buffer overflow
Date: Thu, 22 Jul 2004 12:10:34
Message-Id: 20040722121016.GG24932@mail.lieber.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200407-17
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: l2tpd: Buffer overflow
9 Date: July 22, 2004
10 Bugs: #53009
11 ID: 200407-17
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A buffer overflow in l2tpd could lead to remote code execution. It is
19 not known whether this bug is exploitable.
20
21 Background
22 ==========
23
24 l2tpd is a GPL implentation of the Layer 2 Tunneling Protocol.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 net-dialup/l2tpd < 0.69-r2 >= 0.69-r2
33
34 Description
35 ===========
36
37 Thomas Walpuski discovered a buffer overflow that may be exploitable by
38 sending a specially crafted packet. In order to exploit the vulnerable
39 code, an attacker would need to fake the establishment of an L2TP
40 tunnel.
41
42 Impact
43 ======
44
45 A remote attacker may be able to execute arbitrary code with the
46 privileges of the user running l2tpd.
47
48 Workaround
49 ==========
50
51 There is no known workaround for this vulnerability.
52
53 Resolution
54 ==========
55
56 All users are recommended to upgrade to the latest stable version:
57
58 # emerge sync
59
60 # emerge -pv ">=net-l2tpd-0.69-r2"
61 # emerge ">=net-l2tpd-0.69-r2"
62
63 References
64 ==========
65
66 [ 1 ] CAN-2004-0649
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0649
68 [ 2 ] Full Disclosure Report
69 http://seclists.org/lists/fulldisclosure/2004/Jun/0094.html
70
71 Availability
72 ============
73
74 This GLSA and any updates to it are available for viewing at
75 the Gentoo Security Website:
76
77 http://security.gentoo.org/glsa/glsa-200407-17.xml
78
79 Concerns?
80 =========
81
82 Security is a primary focus of Gentoo Linux and ensuring the
83 confidentiality and security of our users machines is of utmost
84 importance to us. Any security concerns should be addressed to
85 security@g.o or alternatively, you may file a bug at
86 http://bugs.gentoo.org.
87
88 License
89 =======
90
91 Copyright 2004 Gentoo Foundation, Inc; referenced text
92 belongs to its owner(s).
93
94 The contents of this document are licensed under the
95 Creative Commons - Attribution / Share Alike license.
96
97 http://creativecommons.org/licenses/by-sa/1.0