Synopsis
The remote device is missing a vendor-supplied security patch.
Description
Point-to-Point Tunneling Protocol (PPTP) allows users to tunnel to an Internet Protocol (IP) network using a Point-to-Point Protocol (PPP). The protocol is described in RFC2637.
PPTP implementation using Cisco IOS software releases contains a vulnerability that will crash a router if it receives a malformed or crafted PPTP packet. To expose this vulnerability, PPTP must be enabled on the router. PPTP is disabled by default. No additional special conditions are required.
An attacker may use this issue to prevent your network from working properly.
This vulnerability is documented as Cisco Bug ID CSCdt46181.
Solution
http://www.nessus.org/u?1583fe45
Plugin Details
File Name: CSCdt46181.nasl
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
Vulnerability Information
CPE: cpe:/o:cisco:ios
Required KB Items: SNMP/community, SNMP/sysDesc, CISCO/model
Exploit Ease: No known exploits are available
Vulnerability Publication Date: 7/12/2001