MS02-063: Unchecked Buffer in PPTP Implementation Could Enable DOS Attacks (329834)

medium Nessus Plugin ID 11178

Synopsis

It is possible to crash the remote system.

Description

The remote version of Windows contains a flaw in its PPTP implementation. If the remote host is configured to act as a PPTP server, a remote attacker can send a specially crafted packet to corrupt the kernel memory and crash the remote system.

Solution

Microsoft has released a set of patches for Windows XP and 2000.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2002/ms02-063

Plugin Details

Severity: Medium

ID: 11178

File Name: smb_nt_ms02-063.nasl

Version: 1.43

Type: local

Agent: windows

Published: 11/28/2002

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 10/30/2002

Vulnerability Publication Date: 9/26/2002

Reference Information

CVE: CVE-2002-1214

BID: 5807, 6067

MSFT: MS02-063

MSKB: 329834