Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2005:109: php-pear Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the php-pear package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2005:109 (php-pear).
A vulnerability was discovered by GulfTech Security in the PHP XML RPC project.
This vulnerability is considered critical and can lead to remote code
execution. The vulnerability also exists in the PEAR XMLRPC implementation.
Mandriva ships with the PEAR XMLRPC implementation and it has been patched to
correct this problem. It is advised that users examine the PHP applications
they have installed on their servers for any applications that may come bundled
with their own copies of the PEAR system and either patch RPC.php or use the
system PEAR (found in /usr/share/pear).
Updates have been released for some popular PHP applications such as WordPress
and Serendipity and users are urged to take all precautions to protect their
systems from attack and/or defacement by upgrading their applications from the
authors of the respective applications.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:109
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.