Boletines de Vulnerabilidades |
Denegación de servicio en PPTPD |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Denegación de Servicio |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio estandar |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado | PPTPD |
Descripción |
|
Se ha descubierto una vulnerabilidad en PoPToP Point to Point Tunneling Server. La vulnerabilidad reside en un error de programación. Un atacante remoto podría causar una denegación de servicio mediante una conexión PPTP a través de un paquete GRE especialmente construido. |
|
Solución |
|
Actualización de software Debian (DSA 1288-1) Debian Linux Source http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1.dsc http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1.diff.gz http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_alpha.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_amd64.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_amd64.deb ARM http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_arm.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_arm.deb HP Precision http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_hppa.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_hppa.deb Intel IA-32 http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_i386.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_ia64.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_ia64.deb Big endian MIPS http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_mips.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_mipsel.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_powerpc.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_s390.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_sparc.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_sparc.deb Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux Debian (DSA 1288-2) Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2.dsc http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2.diff.gz http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_alpha.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_alpha.deb AMD64 http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_amd64.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_amd64.deb ARM http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_arm.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_arm.deb HP Precision http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_hppa.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_hppa.deb Intel IA-32 http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_i386.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_ia64.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_ia64.deb Big endian MIPS http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_mips.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_mipsel.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_powerpc.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_s390.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch2_sparc.deb http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch2_sparc.deb |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CVE-2007-0244 |
BID | |
Recursos adicionales |
|
Debian Security Advisory (DSA 1288-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00044.html SUSE Security Summary Report (SUSE-SR:2007:010) http://www.novell.com/linux/security/advisories/2007_10_sr.html Debian Security Advisory (DSA 1288-2) http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00129.html |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2007-05-14 |
1.1 | Aviso emitido por Suse (SUSE-SR:2007:010) | 2007-05-15 |
1.2 | Aviso emitido por Debian (DSA 1288-2) | 2007-09-03 |