This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
A vulnerability was discovered in the transparent session ID support
in PHP4 prior to version 4.3.2. It did not properly escape user-
supplied input prior to inserting it in the generated web page. This
could be exploited by an attacker to execute embedded scripts within
the context of the generated HTML (CVE-2003-0442).
As well, two vulnerabilities had not been patched in the PHP packages
included with Mandrake Linux 8.2: The mail() function did not filter
ASCII control filters from its arguments, which could allow an
attacker to modify the mail message content (CVE-2002-0986). Another
vulnerability in the mail() function would allow a remote attacker to
bypass safe mode restrictions and modify the command line arguments
passed to the MTA in the fifth argument (CVE-2002-0985).
All users are encouraged to upgrade to these patched packages.
The packages for Mandrake Linux 8.2 and Multi-Network Firewall 8.2,
due to improper BuildRequires did not include mail() support. This
update corrects that problem.
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5