This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201006-13
(Smarty: Multiple vulnerabilities)
Multiple vulnerabilities have been discovered in Smarty:
The vendor reported that the modifier.regex_replace.php plug-in
contains an input sanitation flaw related to the ASCII NUL character
The vendor reported that the
_expand_quoted_text() function in libs/Smarty_Compiler.class.php
contains an input sanitation flaw via multiple vectors (CVE-2008-4810,
Nine:Situations:Group::bookoo reported that
the smarty_function_math() function in libs/plugins/function.math.php
contains input sanitation flaw (CVE-2009-1669).
These issues might allow a remote attacker to execute arbitrary PHP
There is no known workaround at this time.
See also :
All Smarty users should upgrade to an unaffected version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-php/smarty-2.6.23'
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since June 2, 2009. It is likely that your system is already
no longer affected by this issue.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 46793 (gentoo_GLSA-201006-13.nasl)
Bugtraq ID: 281053186234918
CVE ID: CVE-2008-1066CVE-2008-4810CVE-2008-4811CVE-2009-1669
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.