Buffer overflow in the cluster_process_heartbeat function in cluster.c in layer 2 tunneling protocol network server (l2tpns) before 2.1.21 allows remote attackers to cause a denial of service via a large heartbeat packet.
References
Configurations
History
21 Nov 2024, 00:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://l2tpns.cvs.sourceforge.net/l2tpns/l2tpns/cluster.c?r1=1.53&r2=1.54 - Patch | |
References | () http://secunia.com/advisories/23230 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/23333 - Patch, Vendor Advisory | |
References | () http://sourceforge.net/project/shownotes.php?group_id=97282&release_id=468202 - Vendor Advisory | |
References | () http://www.debian.org/security/2006/dsa-1230 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/21443 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/4860 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30732 - |
Information
Published : 2006-12-12 00:28
Updated : 2024-11-21 00:20
NVD link : CVE-2006-5873
Mitre link : CVE-2006-5873
CVE.ORG link : CVE-2006-5873
JSON object : View
Products Affected
l2tpns
- l2tpns
debian
- debian_linux
CWE