|
Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2005:041: php/pear XML::RPC Vulnerability Scan
Vulnerability Scan Summary Check for the version of the php/pear XML::RPC package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2005:041 (php/pear XML::RPC).
A bug in the PEAR::XML_RPC library allowed remote attackers to
pass arbitrary PHP code to the eval() function.
The updated php packages fix the XML::RPC bug, however several third
party PHP packages include a copy of the problematic XML::RPC code
itself and might be still vulnerable after the update.
Please check their respective websites whether the package is
vulnerable.
The following projects are known to include the XML::RPC code:
- tikiwiki
- postnuke
- drupal
- b2evolution
- b2
- phpGroupWare
- eGroupware
- Serendipity Weblog
- phpAdsNew
- Max Media Manager
This issue is tracked by the Mitre CVE ID CVE-2005-1921.
The bug in the SUSE php packages affects SUSE Linux versions from 8.2
up to 9.3, SUSE Linux Enterprise Server 9 and Open Enterprise Server.
php4 on SUSE Linux Enterprise Server 8 is not affected, since it was
not shipping the XML::RPC extension.
Solution : http://www.suse.de/security/advisories/2005_41_php_pear.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|