|
Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2003:029: pptpd Vulnerability Scan
Vulnerability Scan Summary Check for the version of the pptpd package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2003:029 (pptpd).
The PPTP daemon contains a remotely exploitable buffer overflow which
was introduced due to a integer overflow in the third argument passed
to the read() library call. This bug has been fixed.
Since there is no workaround other than shutting down the PPTP daemon
an update is strongly recommended if you need a PPTP server running.
To be sure the update takes effect you have to restart the PPTP daemon
by executing the following command as root:
'rcpptpd restart'
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
the update.
Solution : http://www.suse.de/security/2003_029.html
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|