SALT LAKE CITY, Utah - October 2nd, 2002 - SnapGear Inc., a leading supplier of Internet security products, announced that their VPN Firewall appliances are free from issues recently discovered in Microsoft® Windows® PPTP software.
Phion Information Technologies
has reported a security vulnerability in the PPTP (Point-to-Point-Tunneling-Protocol) service that ships with
Windows 2000 and Windows XP. The problem is that a specially crafted PPTP
packet can cause a buffer overflow and overwrite kernel memory. An immediate implication is that affected systems are vulnerable to DoS (Denial of Service) attacks, but it may also be possible to execute code of the attacker's choice which could lead to a complete system compromise.
Thomas Essebier, SnapGear Inc.'s VP of Software Engineering, said: "Snap Gear devices are not affected by this vulnerability. This problem does not represent a fundamental issue with the PPTP protocol, just the particular implementation in question. The code base for the Snap Gear PPTP server implementation is completely different from that used by Microsoft. We designed and developed our PPTP server based upon PoPToP, an open source solution that we were instrumental in creating. The open source advantage here is that thousands of eyes have already inspected this code for bugs and errors."
Snap Gear™ VPN Firewall appliances are unique in that they offer both PPTP (client & server) and full peer-to-peer IPSec VPN services. Although IPSec is gradually becoming the VPN protocol of choice there is a huge base of PPTP-ready client software found in almost all Microsoft Windows operating systems. Although PPTP is generally considered to be not as secure as IPSec a broad range of business users still embrace the technology because of the absence of client-software costs and convenience of setup.
Implications for Windows 2000 and XP systems
Phion report that Windows 2000 and Windows XP systems running either
the PPTP server or client may be at risk (their advisory states that
both Windows 2000 and XP clients listen on the PPTP service port - 1723.) Until further
information is available, Snap Gear recommends that customers disable both PPTP
client and server on Windows 2000 and Windows XP systems exposed to
the Internet or any other untrusted network. Systems protected by a
Snap Gear firewall blocking port 1723 should not be vulnerable to
an outside attack, but it would still be prudent to disable non-appliance PPTP
services until a Microsoft patch is available.
Miles Gillham, VP Marketing of SnapGear Inc., said: "Customers using Snap Gear appliances for their infrastructure are completely shielded at both the client and server sides. IT managers in SMB/SMEs like our products because we offer lifetime free firmware upgrades, no inbuilt user limitations, and interoperate with other leading VPN technologies. It's big iron technology in a small, affordable appliance."
More information about the PPTP and IPSec protocols are available from Snap Gear VPN Overview (www.snapgear.com/vpn.html).
About Snap Gear, Inc.
SnapGear Inc. produces Snap Gear VPN Firewall Appliances designed to provide Internet security and privacy of communications for small to medium enterprises. Snap Gear also does complete custom engineering and provides turnkey development, design, manufacturing, and fulfillment services for major telecommunications companies and silicon manufacturers. For more information on Snap Gear products please visit www.snapgear.com.
The Snap Gear LITE+ recently won the prestigious 2002 Linux Journal Editor's Choice Award for Best Server Appliance.
"Snap Gear" is a trademark of SnapGear Inc. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other products, services, companies and publications are trademarks or registered trademarks of their respective owners.
Press only, contact:
Snap Gear, Inc.
(801) 282 8492