Buffer overflow in the cluster_process_heartbeat function in cluster.c in layer 2 tunneling protocol network server (l2tpns) before 2.1.21 allows remote attackers to cause a denial of service via a large heartbeat packet.
References
Link | Resource |
---|---|
http://l2tpns.cvs.sourceforge.net/l2tpns/l2tpns/cluster.c?r1=1.53&r2=1.54 | Patch |
http://secunia.com/advisories/23230 | Patch Vendor Advisory |
http://secunia.com/advisories/23333 | Patch Vendor Advisory |
http://sourceforge.net/project/shownotes.php?group_id=97282&release_id=468202 | Vendor Advisory |
http://www.debian.org/security/2006/dsa-1230 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/21443 | Vendor Advisory |
http://www.vupen.com/english/advisories/2006/4860 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30732 |
Configurations
History
No history.
Information
Published : 2006-12-12 00:28
Updated : 2024-02-04 17:13
NVD link : CVE-2006-5873
Mitre link : CVE-2006-5873
CVE.ORG link : CVE-2006-5873
JSON object : View
Products Affected
debian
- debian_linux
l2tpns
- l2tpns
CWE