First published: Tue Dec 12 2006(Updated: )
Buffer overflow in the cluster_process_heartbeat function in cluster.c in layer 2 tunneling protocol network server (l2tpns) before 2.1.21 allows remote attackers to cause a denial of service via a large heartbeat packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libp2p | =2.0.13 | |
Libp2p | =2.1 | |
Libp2p | =1.1 | |
Debian | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5873 has a high severity rating due to its potential to cause denial of service through buffer overflow.
To fix CVE-2006-5873, upgrade to l2tpns version 2.1.21 or later, which addresses the buffer overflow vulnerability.
CVE-2006-5873 affects versions of l2tpns prior to 2.1.21, as well as Debian systems running version 3.1.
CVE-2006-5873 can lead to remote denial of service attacks through the exploitation of large heartbeat packets.
Remote attackers with the ability to send large heartbeat packets can exploit CVE-2006-5873.