Debian Security Advisory
DSA-1288-1 pptpd -- programming error
- Date Reported:
- 08 May 2007
- Affected Packages:
- pptpd
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2007-0244.
- More information:
-
It was discovered that the PoPToP Point to Point Tunneling Server contains a programming error, which allows the tear-down of a PPTP connection through a malformed GRE packet, resulting in denial of service.
The oldstable distribution (sarge) is not affected by this problem.
For the stable distribution (etch) this problem has been fixed in version 1.3.0-2etch1.
For the unstable distribution (sid) this problem has been fixed in version 1.3.4-1.
We recommend that you upgrade your pptpd packages.
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1.dsc
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1.diff.gz
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0.orig.tar.gz
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_alpha.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_alpha.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_amd64.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_amd64.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_arm.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_arm.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_arm.deb
- HPPA:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_hppa.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_hppa.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_i386.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_i386.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_ia64.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_ia64.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_ia64.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_mips.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_mips.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_mipsel.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_mipsel.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_powerpc.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_powerpc.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_s390.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_s390.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/p/pptpd/bcrelay_1.3.0-2etch1_sparc.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_sparc.deb
- http://security.debian.org/pool/updates/main/p/pptpd/pptpd_1.3.0-2etch1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.