-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

           ESB-2001.068 -- Microsoft Security Bulletin MS01-009
            Patch Available for "Malformed PPTP Packet Stream"
                             19 February 2001

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                PPTP
Vendor:                 Microsoft
Operating System:       Windows NT 4.0 Server
                        Windows NT 4.0 Server, Enterprise Edition
                        Windows NT 4.0 Server, Terminal Server Edition
Impact:                 Denial of Service
Access Required:        Remote

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

- - ----------------------------------------------------------------------
Title:      Patch Available for "Malformed PPTP Packet Stream"
            Vulnerability
Date:       13 February 2001
Software:   Windows NT 4.0 servers running PPTP
Impact:     Denial of service
Bulletin:   MS01-009

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-009.asp.
- - ----------------------------------------------------------------------

Issue:
======
The PPTP service in Windows NT 4.0 has a flaw in a part of the code
that handles a  particular type of data packet, which results in a
leak of kernel memory. If a sufficient  number of packets containing
a specific malformation were received by an affected server,  kernel
memory would eventually become exhausted. The likely outcome would be
that the server  would either hang or fail altogether. In either
case, the machine would need to be rebooted  to restore normal
operation, and any PPTP sessions underway at the time would be lost.
It  would not be necessary for the attacker to establish a valid PPTP
session in order to  exploit the vulnerability.

Mitigating Factors:
====================
 - The vulnerability does not threaten the security of data within
   PPTP sessions -- it is strictly a denial of service vulnerability.
 - Only Windows NT 4.0 machines running the PPTP service are at risk.
   The service does not run by default.
 - The Windows 2000 PPTP service is not affected by the
   vulnerability.

Patch Availability:
===================
 - A patch is available to fix this vulnerability. Please read the
   Security Bulletin
   http://www.microsoft.com/technet/security/bulletin/ms01-009.asp
   for information on obtaining this patch.

Acknowledgment:
===============
 - Kirk Corey of Diversified Software Industries, Inc.
   (www.dsi-inc.net)

- - ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.



- -----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOomSeo0ZSRQxA/UrAQEciwf/a6hH3dCeDNjzohPMkiyYcWjG1xMR7tZ8
46er4RrKpH24Gf7x5Oy9YLu3sY3S3Ga+bKh7f3Rku8RJQq92tGU7tBFoW9/w4Ini
oz2Q5035Hh8aGZBHW6d9OmOpGKh8OAROTjCDyoyaj2WWFHh28XHowQ+OWyTAWbec
aZlXMmOCuT+BJBjHSt++wkoPufaFJPCkggXilMHGnraWhEYR6bYxxumqCdEQXNhU
nVrzj0RX3DWAfj/kj3SGPVskGay5s8sOLLji/Hhr6Va+tMlS/Aa7ZJ/oZ7tlQIdg
yi8HO1Q+0NyARnc+i5RmuNpWRpfb46o0hht//F5nv6jM1cjyar0uAA==
=XupL
- -----END PGP SIGNATURE-----


- --------------------------END INCLUDED TEXT--------------------

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBOpDtOSh9+71yA2DNAQGNkwP/SAZR5/Jj4YxsmGmG9ygajdyH+ld0xrCn
6MSyxfMBTe4kX5l0eI9WMcnViyWG5CPG88fP+1qzNZ+o7b8MDMZO5a9irZDzELqM
6aVSJ1Ckod99kQNdUswzN+mzktSu4az2iykeReRGzjGoIOsibcE6ku/DGfWBQ1eR
kkG3/n+3OSg=
=zGE/
-----END PGP SIGNATURE-----