Korean
<< Back
VID 26031
Severity 40
Port 139
Protocol TCP
Class SMB
Detailed Description The hotfix (Q329834) for the "Unchecked Buffer in PPTP Implementation" problem is not applied.
PPTP (Point-to-Point Tunneling Protocol) is an industry standard protocol (defined in RFC 2637) that enables users to create and use virtual private networks (VPNs). Through VPN technologies such as PPTP, users can create secure connections to a remote network, even though the data may transit insecure networks like the Internet.
A buffer overflow vulnerability has been reported for Microsoft's PPTP implementation. By sending a specially-crafted PPTP packet to the PPTP service listening on TCP port 1723, a remote attacker could cause the system to crash or execute arbitrary code on the server.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* Platforms Affected:
Microsoft Windows 2000
Microsoft Windows XP

* References:
http://www.microsoft.com/technet/security/bulletin/ms02-063.asp
http://online.securityfocus.com/bid/5807
Recommendation Apply the appropriate patch for your system. The Windows 2000 patch can be installed on systems running Windows 2000 Service Pack 1 or Service Pack 2, and The patch for Windows XP can be installed on systems running Windows XP Gold or Service Pack 1.

Download locations:
o Microsoft Windows 2000:
http://www.microsoft.com/downloads/Release.asp?ReleaseID=43606
o Microsoft Windows XP:
32-bit: http://www.microsoft.com/downloads/Release.asp?ReleaseID=43635
64-bit: http://www.microsoft.com/downloads/Release.asp?ReleaseID=43631
Related URL CVE-2002-1183 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)