SUSE-SA:2005:041: php/pear XML::RPC

This script is Copyright (C) 2005-2010 Tenable Network Security, Inc.

Synopsis :

The remote host is missing a vendor-supplied security patch

Description :

The remote host is missing the patch for the advisory SUSE-SA:2005:041 (php/pear XML::RPC).

A bug in the PEAR::XML_RPC library allowed remote attackers to
pass arbitrary PHP code to the eval() function.

The updated php packages fix the XML::RPC bug, however several third
party PHP packages include a copy of the problematic XML::RPC code
itself and might be still vulnerable after the update.

Please check their respective websites whether the package is

The following projects are known to include the XML::RPC code:
- tikiwiki
- postnuke
- drupal
- b2evolution
- b2
- phpGroupWare
- eGroupware
- Serendipity Weblog
- phpAdsNew
- Max Media Manager

This issue is tracked by the Mitre CVE ID CVE-2005-1921.

The bug in the SUSE php packages affects SUSE Linux versions from 8.2
up to 9.3, SUSE Linux Enterprise Server 9 and Open Enterprise Server.

php4 on SUSE Linux Enterprise Server 8 is not affected, since it was
not shipping the XML::RPC extension.

Solution :

Risk factor :


Family: SuSE Local Security Checks

Nessus Plugin ID: 19250 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now