How to Buy
This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote Slackware host is missing a security update.
New PHP packages are available for Slackware 8.1, 9.0, 9.1, 10.0,
10.1, and -current to fix security issues. PHP has been relinked with
the shared PCRE library to fix an overflow issue with PHP's builtin
PRCE code, and PEAR::XMLRPC has been upgraded to version 1.4.0 which
eliminates the eval() function. The eval() function is believed to be
insecure as implemented, and would be difficult to secure. Note that
these new packages now require that the PCRE package be installed, so
be sure to get the new package from the patches/packages/ directory if
you don't already have it. A new version of this (6.3) was also issued
today, so be sure that is the one you install.
See also :
Update the affected php package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false
Family: Slackware Local Security Checks
Nessus Plugin ID: 19859 ()
CVE ID: CVE-2005-2491CVE-2005-2498
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.