Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:PPTP:POPTOP-OF

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

PoPToP 'poptop-sane.c' Buffer Overflow

Release Date

2003/05/14

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: PoPToP 'poptop-sane.c' Buffer Overflow


This signature detects attempts to exploit a known vulnerability in Poptop PPTP Server for Linux. Poptop 1.0.1 and earlier versions are vulnerable. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of logged-in user.

Extended Description

A buffer-overflow vulnerability has been discovered in PoPToP PPTP. The problem occurs because the software fails to do sufficient sanity checks when referencing user-supplied input used in various calculations. As a result, an attacker may be able to trigger a condition that would corrupt sensitive memory. Successful exploits of this issue may allow attackers to execute arbitrary code with the privileges of the affected server.

Affected Products

  • PoPToP PPTP Server 1.0.0
  • PoPToP PPTP Server 1.0.1
  • PoPToP PPTP Server 1.1.2
  • PoPToP PPTP Server 1.1.3
  • PoPToP PPTP Server 1.1.3 -20021009
  • PoPToP PPTP Server 1.1.4 -b1
  • PoPToP PPTP Server 1.1.4 -b2
  • Red Hat Linux 9.0.0 I386

References

  • BugTraq: 7316
  • CVE: CVE-2003-0213
  • URL: http://www.securityfocus.com/archive/1/317995
  • URL: http://www.kb.cert.org/vuls/id/673993

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out