Nessus Plugin #11540

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

PPTP overflow

Family:
Gain root remotely
Category:
attack
Copyright:
This script is Copyright (C) 2003 Xue Yong Zhi
Summary:
Determine if a remote PPTP server has remote buffer overflow vulnerability
Version:
$Revision: 1.6 $
Cve_id:
CAN-2003-0213
Bugtraq_id:
7316
Xrefs:
SuSE:SUSE-SA:2003:029
Description:

The remote PPTP server has remote buffer overflow vulnerability.
The problem occurs due to insufficient sanity checks when referencing
user-supplied input used in various calculations. As a result, it may
be possible for an attacker to trigger a condition where sensitive
memory can be corrupted. Successful exploitation of this issue may
allow an attacker to execute arbitrary code with the privileges of
the affected server.

Solution : The vendor has released updated releases of
PPTP server which address this issue. Users are advised
to upgrade as soon as possible.

Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.