|
Family: Debian Local Security Checks --> Category: infos
[DSA789] DSA-789-1 php4 Vulnerability Scan
Vulnerability Scan Summary DSA-789-1 php4
Detailed Explanation for this Vulnerability Test
Several security related problems have been found in PHP4, the
server-side, HTML-embedded scripting language. The Common
Vulnerabilities and Exposures project identifies the following
problems:
Eric Romang discovered insecure temporary files in the shtool
utility shipped with PHP that can exploited by a local attacker to
overwrite arbitrary files. Only this vulnerability affects
packages in oldstable.
GulfTech has discovered that PEAR XML_RPC is vulnerable to a
remote PHP code execution vulnerability that may allow a possible hacker
to compromise a vulnerable server.
Stefan Esser discovered another vulnerability in the XML-RPC
libraries that allows injection of arbitrary PHP code into eval()
statements.
For the old stable distribution (woody) these problems have been fixed in
version 4.1.2-7.woody5.
For the stable distribution (sarge) these problems have been fixed in
version 4.3.10-16.
For the unstable distribution (sid) these problems have been fixed in
version 4.4.0-2.
We recommend that you upgrade your PHP packages.
Solution : http://www.debian.org/security/2005/dsa-789
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|