27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: http://www.cisco.com/warp/public/707/cisco-sn-20030221-ospf.shtml<br />

CVE-2003-0100<br />

Cisco IOS PPTP Packet Remote DoS (Bug ID CSCdt46181)<br />

<strong>PVS</strong> ID: 2204 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10979<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n<br />

Point-to-Point Tunneling Protocol (PPTP) allows users to tunnel to an Internet Protocol<br />

(IP) network using a Point-to-Point Protocol (PPP). The protocol is described in RFC2637.<br />

PPTP implementation using Cisco IOS software releases contains a vulnerability that will<br />

crash a router if it receives a malformed or crafted PPTP packet. To expose this<br />

vulnerability, PPTP must be enabled on the router. PPTP is disabled by default. No<br />

additional special conditions are required. An attacker may use this issue to prevent a<br />

network from working properly. This vulnerability is documented as Cisco Bug ID<br />

CSCdt46181<br />

Solution: http://www.cisco.com/warp/public/707/PPTP-vulnerability-pub.html<br />

CVE-2001-1183<br />

Cisco IOS PPTP Packet Remote DoS (Bug ID CSCdt46181)<br />

<strong>PVS</strong> ID: 2205 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10979<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n<br />

Point-to-Point Tunneling Protocol (PPTP) allows users to tunnel to an Internet Protocol<br />

(IP) network using a Point-to-Point Protocol (PPP). The protocol is described in RFC2637.<br />

PPTP implementation using Cisco IOS software releases contains a vulnerability that will<br />

crash a router if it receives a malformed or crafted PPTP packet. To expose this<br />

vulnerability, PPTP must be enabled on the router. PPTP is disabled by default. No<br />

additional special conditions are required. An attacker may use this issue to prevent a<br />

network from working properly. This vulnerability is documented as Cisco Bug ID<br />

CSCdt46181<br />

Solution: http://www.cisco.com/warp/public/707/PPTP-vulnerability-pub.html<br />

CVE-2001-1183<br />

Cisco IOS PPTP Packet Remote DoS (Bug ID CSCdt46181)<br />

<strong>PVS</strong> ID: 2206 FAMILY: SNMP Traps<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10979<br />

Family Internet Services 552

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!