Medium Nessus Plugin ID 13798
SynopsisThe remote host is missing a vendor-supplied security patch
DescriptionThe remote host is missing the patch for the advisory SUSE-SA:2003:029 (pptpd).
The PPTP daemon contains a remotely exploitable buffer overflow which was introduced due to a integer overflow in the third argument passed to the read() library call. This bug has been fixed.
Since there is no workaround other than shutting down the PPTP daemon an update is strongly recommended if you need a PPTP server running.
To be sure the update takes effect you have to restart the PPTP daemon by executing the following command as root:
Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply the update.