First published: Tue Jul 13 2004(Updated: )
Buffer overflow in write_packet in control.c for l2tpd may allow remote attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
L2tpd L2tpd | =0.64 | |
L2tpd L2tpd | =0.65 | |
L2tpd L2tpd | =0.62 | |
L2tpd L2tpd | =0.66 | |
L2tpd L2tpd | =0.63 | |
L2tpd L2tpd | =0.67 | |
L2tpd L2tpd | =0.68 | |
L2tpd L2tpd | =0.69 | |
Gentoo Linux | =1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0649 is considered critical due to its potential for remote code execution.
To fix CVE-2004-0649, upgrade l2tpd to version 0.70 or later.
CVE-2004-0649 affects l2tpd versions 0.62 through 0.69.
Yes, CVE-2004-0649 may allow remote attackers to execute arbitrary code on affected systems.
Gentoo Linux 1.4 and various versions of l2tpd from 0.62 to 0.69 are vulnerable to CVE-2004-0649.