SUSE-SA:2005:041: php/pear XML::RPC

high Nessus Plugin ID 19250

Synopsis

The remote host is missing a vendor-supplied security patch

Description

The remote host is missing the patch for the advisory SUSE-SA:2005:041 (php/pear XML::RPC).


A bug in the PEAR::XML_RPC library allowed remote attackers to pass arbitrary PHP code to the eval() function.

The updated php packages fix the XML::RPC bug, however several third party PHP packages include a copy of the problematic XML::RPC code itself and might be still vulnerable after the update.

Please check their respective websites whether the package is vulnerable.

The following projects are known to include the XML::RPC code:
- tikiwiki
- postnuke
- drupal
- b2evolution
- b2
- phpGroupWare
- eGroupware
- Serendipity Weblog
- phpAdsNew
- Max Media Manager

This issue is tracked by the Mitre CVE ID CVE-2005-1921.

The bug in the SUSE php packages affects SUSE Linux versions from 8.2 up to 9.3, SUSE Linux Enterprise Server 9 and Open Enterprise Server.

php4 on SUSE Linux Enterprise Server 8 is not affected, since it was not shipping the XML::RPC extension.

Solution

http://www.suse.de/security/advisories/2005_41_php_pear.html

Plugin Details

Severity: High

ID: 19250

File Name: suse_SA_2005_041.nasl

Version: 1.9

Agent: unix

Published: 7/20/2005

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Vulnerability Information

Required KB Items: Host/SuSE/rpm-list