How to Buy
This script is Copyright (C) 2003-2012 Xue Yong Zhi & Tenable Network Security, Inc.
Arbitrary code may be run on the remote server.
The remote PPTP server has remote buffer overflow vulnerability.
The problem occurs due to insufficient sanity checks when referencing
user-supplied input used in various calculations. As a result, it may
be possible for an attacker to trigger a condition where sensitive
memory can be corrupted. Successful exploitation of this issue may
allow an attacker to execute arbitrary code with the privileges of
the affected server.
The vendor has released updated releases of PPTP server that address
this issue. Users are advised to upgrade as soon as possible.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true
Family: Gain a shell remotely
Nessus Plugin ID: 11540 ()
Bugtraq ID: 7316
CVE ID: CVE-2003-0213
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.