Synopsis
The remote host is missing a vendor-supplied security patch
Description
The remote host is missing the patch for the advisory SUSE-SA:2005:041 (php/pear XML::RPC).
A bug in the PEAR::XML_RPC library allowed remote attackers to pass arbitrary PHP code to the eval() function.
The updated php packages fix the XML::RPC bug, however several third party PHP packages include a copy of the problematic XML::RPC code itself and might be still vulnerable after the update.
Please check their respective websites whether the package is vulnerable.
The following projects are known to include the XML::RPC code:
- tikiwiki
- postnuke
- drupal
- b2evolution
- b2
- phpGroupWare
- eGroupware
- Serendipity Weblog
- phpAdsNew
- Max Media Manager
This issue is tracked by the Mitre CVE ID CVE-2005-1921.
The bug in the SUSE php packages affects SUSE Linux versions from 8.2 up to 9.3, SUSE Linux Enterprise Server 9 and Open Enterprise Server.
php4 on SUSE Linux Enterprise Server 8 is not affected, since it was not shipping the XML::RPC extension.
Solution
http://www.suse.de/security/advisories/2005_41_php_pear.html
Plugin Details
File Name: suse_SA_2005_041.nasl
Agent: unix
Supported Sensors: Nessus Agent, Continuous Assessment, Nessus
Vulnerability Information
Required KB Items: Host/SuSE/rpm-list