Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2003:029: pptpd Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the pptpd package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2003:029 (pptpd).
The PPTP daemon contains a remotely exploitable buffer overflow which
was introduced due to a integer overflow in the third argument passed
to the read() library call. This bug has been fixed.
Since there is no workaround other than shutting down the PPTP daemon
an update is strongly recommended if you need a PPTP server running.
To be sure the update takes effect you have to restart the PPTP daemon
by executing the following command as root:
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
Solution : http://www.suse.de/security/2003_029.html
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.