MS02-063: Unchecked Buffer in PPTP Implementation Could Enable Denial of Service Attacks (Q329834)

Software: Windows 2000, Windows XP

Impact: Denial of Service

Max Risk: Critical

Windows 2000 and Windows XP natively support Point-to-Point Tunneling Protocol (PPTP), a Virtual Private Networking technology that is implemented as part of Remote Access Services (RAS). PPTP support is an optional component in Windows NT 4.0, Windows 98, Windows 98SE, and Windows ME.

A security vulnerability results in the Windows 2000 and Windows XP implementations because of an unchecked buffer in a section of code that processes the control data used to establish, maintain and tear down PPTP connections. By delivering specially malformed PPTP control data to an affected server, an attacker could corrupt kernel memory and cause the system to fail, disrupting any work in progress on the system.

The vulnerability could be exploited against any server that offers PPTP. If a workstation had been configured to operate as a RAS server offering PPTP services, it could likewise be attacked. Workstations acting as PPTP clients could only be attacked during active PPTP sessions. Normal operation on any attacked system could be restored by restarting the system.

Download: Patch for Windows XP 32-bit

Download: Patch for Windows XP 64-bit

Download: Patch for Windows 2000

Report a problem with article
Next Article

MS02-062: Cumulative Patch for Internet Information Service (Q327696)

Previous Article

MS02-064: Windows 2000 Default Permissions Could Allow Trojan Horse Program