Summary
The remote host is missing an update to pptpd
announced via advisory DSA 295-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20295-1
Insight
Timo Sirainen discovered a vulnerability in pptpd, a Point to Point Tunneling Server, which implements PPTP-over-IPSEC and is commonly used to create Virtual Private Networks (VPN). By specifying a small packet length an attacker is able to overflow a buffer and execute code under the user id that runs pptpd, probably root. An exploit for this problem is already circulating.
For the stable distribution (woody) this problem has been fixed in version 1.1.2-1.4.
For the old stable distribution (potato) this problem has been fixed in version 1.0.0-4.2.
For the unstable distribution (sid) this problem has been fixed in version 1.1.4-0.b3.2.
We recommend that you upgrade your pptpd package immediately.
Severity
Classification
-
CVE CVE-2003-0213 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities