Debian DSA-152-1 : l2tpd - missing random seed

High Nessus Plugin ID 14989


The remote Debian host is missing a security-related update.


Current versions of l2tpd, a layer 2 tunneling client/server program, forgot to initialize the random generator which made it vulnerable since all generated random number were 100% guessable. When dealing with the size of the value in an attribute value pair, too many bytes were able to be copied, which could lead into the vendor field being overwritten.

These problems have been fixed in version 0.67-1.1 for the current stable distribution (woody) and in version 0.68-1 for the unstable distribution (sid). The old stable distribution (potato) is not affected, since it doesn't contain the l2tpd package.


Upgrade the l2tpd packages.

See Also

Plugin Details

Severity: High

ID: 14989

File Name: debian_DSA-152.nasl

Version: 1.17

Type: local

Agent: unix

Published: 2004/09/29

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:l2tpd, cpe:/o:debian:debian_linux:3.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2002/08/13

Reference Information

CVE: CVE-2002-0872, CVE-2002-0873

BID: 5451

DSA: 152