Debian Security Advisory
DSA-152-1 l2tpd -- missing random seed
- Date Reported:
- 13 Aug 2002
- Affected Packages:
- l2tpd
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 5451.
In Mitre's CVE dictionary: CVE-2002-0872, CVE-2002-0873. - More information:
-
Current versions of l2tpd, a layer 2 tunneling client/server program, forgot to initialize the random generator which made it vulnerable since all generated random number were 100% guessable. When dealing with the size of the value in an attribute value pair, too many bytes were able to be copied, which could lead into the vendor field being overwritten.
These problems have been fixed in version 0.67-1.1 for the current stable distribution (woody) and in version 0.68-1 for the unstable distribution (sid). The old stable distribution (potato) is not affected, since it doesn't contain the l2tpd package.
We recommend that you upgrade your l2tpd packages.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1.dsc
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1.diff.gz
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67.orig.tar.gz
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_ia64.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/l/l2tpd/l2tpd_0.67-1.1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.