# # # This script is (C) 2003 Renaud Deraison # # if (description) { script_id(11388); script_cve_id("CVE-2002-0872", "CVE-2002-0873"); script_version ("$Revision$"); script_name(english:"l2tpd < 0.68 overflow"); desc["english"] = " The remote host is running a version of l2tpd which is older or equal to 0.67. This version is vulnerable to a buffer overflow which may allow an attacker to gain a root shell on this host. In addition, this program does not initialize its random number generator. Therefore, an attacker may predict some key values and hijack L2TP sessions established to this host. Solution : upgrade to l2tpd 0.68 or newer Risk factor : High"; script_description(english:desc["english"]); script_summary(english:"Determines the version of the remote l2tpd"); script_category(ACT_GATHER_INFO); script_family(english:"Gain root remotely"); script_copyright(english:"This script is Copyright (C) 2003 Renaud Deraison"); exit(0); } function find_firmware(rep) { local_var i, firmware; for(i=12;i< r) || ("Adtran" >< r)) { firmware = find_firmware(rep:r); hi = firmware / 256; lo = firmware % 256; if((hi == 0x06) && (lo <= 0x70))security_hole(port:1701, proto:"udp"); }