This script is Copyright (C) 2004-2010 Tenable Network Security, Inc.
The remote host is missing a vendor-supplied security patch
The remote host is missing the patch for the advisory SUSE-SA:2003:029 (pptpd).
The PPTP daemon contains a remotely exploitable buffer overflow which
was introduced due to a integer overflow in the third argument passed
to the read() library call. This bug has been fixed.
Since there is no workaround other than shutting down the PPTP daemon
an update is strongly recommended if you need a PPTP server running.
To be sure the update takes effect you have to restart the PPTP daemon
by executing the following command as root:
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now