Vulnerabilites related to l2tpd - l2tpd
CVE-2004-0649 (GCVE-0-2004-0649)
Vulnerability from cvelistv5
Published
2004-07-13 04:00
Modified
2024-08-08 00:24
Severity ?
CWE
  • n/a
Summary
Buffer overflow in write_packet in control.c for l2tpd may allow remote attackers to execute arbitrary code.
References
http://www.debian.org/security/2004/dsa-530 vendor-advisory, x_refsource_DEBIAN
http://marc.info/?l=bugtraq&m=108640917925735&w=2 mailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/16326 vdb-entry, x_refsource_XF
http://security.gentoo.org/glsa/glsa-200407-17.xml vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:24:27.036Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-530",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2004/dsa-530"
          },
          {
            "name": "20040604 bss-based buffer overflow in l2tpd",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=108640917925735\u0026w=2"
          },
          {
            "name": "l2tpd-writepacket-bo(16326)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16326"
          },
          {
            "name": "GLSA-200407-17",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200407-17.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-06-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in write_packet in control.c for l2tpd may allow remote attackers to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-530",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2004/dsa-530"
        },
        {
          "name": "20040604 bss-based buffer overflow in l2tpd",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=108640917925735\u0026w=2"
        },
        {
          "name": "l2tpd-writepacket-bo(16326)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16326"
        },
        {
          "name": "GLSA-200407-17",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200407-17.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0649",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in write_packet in control.c for l2tpd may allow remote attackers to execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-530",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2004/dsa-530"
            },
            {
              "name": "20040604 bss-based buffer overflow in l2tpd",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=108640917925735\u0026w=2"
            },
            {
              "name": "l2tpd-writepacket-bo(16326)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16326"
            },
            {
              "name": "GLSA-200407-17",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200407-17.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0649",
    "datePublished": "2004-07-13T04:00:00",
    "dateReserved": "2004-07-09T00:00:00",
    "dateUpdated": "2024-08-08T00:24:27.036Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-0873 (GCVE-0-2002-0873)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 03:03
Severity ?
CWE
  • n/a
Summary
Vulnerability in l2tpd 0.67 allows remote attackers to overwrite the vendor field via a long value in an attribute/value pair, possibly via a buffer overflow.
References
http://www.debian.org/security/2002/dsa-152 vendor-advisory, x_refsource_DEBIAN
http://www.iss.net/security_center/static/10460.php vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:03:49.276Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-152",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2002/dsa-152"
          },
          {
            "name": "l2tpd-vendor-field-bo(10460)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/10460.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-08-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Vulnerability in l2tpd 0.67 allows remote attackers to overwrite the vendor field via a long value in an attribute/value pair, possibly via a buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-03-25T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-152",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2002/dsa-152"
        },
        {
          "name": "l2tpd-vendor-field-bo(10460)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/10460.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0873",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Vulnerability in l2tpd 0.67 allows remote attackers to overwrite the vendor field via a long value in an attribute/value pair, possibly via a buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-152",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2002/dsa-152"
            },
            {
              "name": "l2tpd-vendor-field-bo(10460)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/10460.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0873",
    "datePublished": "2003-04-02T05:00:00",
    "dateReserved": "2002-08-16T00:00:00",
    "dateUpdated": "2024-08-08T03:03:49.276Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-0872 (GCVE-0-2002-0872)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 03:03
Severity ?
CWE
  • n/a
Summary
l2tpd 0.67 does not initialize the random number generator, which allows remote attackers to hijack sessions.
References
http://www.debian.org/security/2002/dsa-152 vendor-advisory, x_refsource_DEBIAN
http://www.iss.net/security_center/static/9845.php vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/5451 vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:03:49.348Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-152",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2002/dsa-152"
          },
          {
            "name": "l2tpd-rand-number-predictable(9845)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9845.php"
          },
          {
            "name": "5451",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5451"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-08-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "l2tpd 0.67 does not initialize the random number generator, which allows remote attackers to hijack sessions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-03-25T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-152",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2002/dsa-152"
        },
        {
          "name": "l2tpd-rand-number-predictable(9845)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9845.php"
        },
        {
          "name": "5451",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5451"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0872",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "l2tpd 0.67 does not initialize the random number generator, which allows remote attackers to hijack sessions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-152",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2002/dsa-152"
            },
            {
              "name": "l2tpd-rand-number-predictable(9845)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9845.php"
            },
            {
              "name": "5451",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5451"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0872",
    "datePublished": "2003-04-02T05:00:00",
    "dateReserved": "2002-08-16T00:00:00",
    "dateUpdated": "2024-08-08T03:03:49.348Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2002-09-05 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Vulnerability in l2tpd 0.67 allows remote attackers to overwrite the vendor field via a long value in an attribute/value pair, possibly via a buffer overflow.
Impacted products
Vendor Product Version
l2tpd l2tpd 0.62
l2tpd l2tpd 0.63
l2tpd l2tpd 0.64
l2tpd l2tpd 0.65
l2tpd l2tpd 0.66
l2tpd l2tpd 0.67



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA9CA27-499F-457F-AC0C-8F8F28FEDA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E97113-44A0-4A6A-A1E6-E91E46EB7E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2EA5E12-99C4-44ED-A6C7-B476A623E6EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "054C8F11-4519-4911-BEAF-B0597A93E1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8D78FD-6ABA-4F66-BFAC-E0E0E88EFACF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A65824C-1648-4E0E-B9DA-2A45C24C3D3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Vulnerability in l2tpd 0.67 allows remote attackers to overwrite the vendor field via a long value in an attribute/value pair, possibly via a buffer overflow."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad en l2tpd permite a atacantes remotos sobreescribir el campo del proveedor (vendor) mediante un valor largo en el par atributo/valor, posiblemente mediante un desbordamiento de b\u00fafer."
    }
  ],
  "id": "CVE-2002-0873",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-09-05T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2002/dsa-152"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.iss.net/security_center/static/10460.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2002/dsa-152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.iss.net/security_center/static/10460.php"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-08-06 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in write_packet in control.c for l2tpd may allow remote attackers to execute arbitrary code.
Impacted products
Vendor Product Version
l2tpd l2tpd 0.62
l2tpd l2tpd 0.63
l2tpd l2tpd 0.64
l2tpd l2tpd 0.65
l2tpd l2tpd 0.66
l2tpd l2tpd 0.67
l2tpd l2tpd 0.68
l2tpd l2tpd 0.69
gentoo linux 1.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA9CA27-499F-457F-AC0C-8F8F28FEDA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E97113-44A0-4A6A-A1E6-E91E46EB7E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2EA5E12-99C4-44ED-A6C7-B476A623E6EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "054C8F11-4519-4911-BEAF-B0597A93E1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8D78FD-6ABA-4F66-BFAC-E0E0E88EFACF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A65824C-1648-4E0E-B9DA-2A45C24C3D3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "9343FDA3-6709-429C-96AC-2134FED40E17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD711B92-6FF7-4348-A083-DBA9A50F73B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in write_packet in control.c for l2tpd may allow remote attackers to execute arbitrary code."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en write_packet en control.c de l2tpd puede permitir a atacantes remotos ejecutar c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2004-0649",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-08-06T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=108640917925735\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200407-17.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-530"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=108640917925735\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200407-17.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-530"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16326"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-09-05 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
l2tpd 0.67 does not initialize the random number generator, which allows remote attackers to hijack sessions.
Impacted products
Vendor Product Version
l2tpd l2tpd 0.62
l2tpd l2tpd 0.63
l2tpd l2tpd 0.64
l2tpd l2tpd 0.65
l2tpd l2tpd 0.66
l2tpd l2tpd 0.67



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BA9CA27-499F-457F-AC0C-8F8F28FEDA2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E97113-44A0-4A6A-A1E6-E91E46EB7E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2EA5E12-99C4-44ED-A6C7-B476A623E6EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "054C8F11-4519-4911-BEAF-B0597A93E1DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8D78FD-6ABA-4F66-BFAC-E0E0E88EFACF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:l2tpd:l2tpd:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A65824C-1648-4E0E-B9DA-2A45C24C3D3F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "l2tpd 0.67 does not initialize the random number generator, which allows remote attackers to hijack sessions."
    },
    {
      "lang": "es",
      "value": "l2tpd 0.67 no inicializa el generador de n\u00fameros aleatorios, lo que permiter a atacantes remotos secuestrar sesiones."
    }
  ],
  "id": "CVE-2002-0872",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-09-05T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2002/dsa-152"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.iss.net/security_center/static/9845.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/5451"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2002/dsa-152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.iss.net/security_center/static/9845.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/5451"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}