Debian DSA-747-1 : egroupware - input validation error

High Nessus Plugin ID 18662

Synopsis

The remote Debian host is missing a security-related update.

Description

A vulnerability has been identified in the xmlrpc library included in the egroupware package. This vulnerability could lead to the execution of arbitrary commands on the server running egroupware.

The old stable distribution (woody) did not include egroupware.

Solution

Upgrade the egroupware package.

For the current stable distribution (sarge), this problem is fixed in version 1.0.0.007-2.dfsg-2sarge1.

See Also

http://www.debian.org/security/2005/dsa-747

Plugin Details

Severity: High

ID: 18662

File Name: debian_DSA-747.nasl

Version: 1.20

Type: local

Agent: unix

Published: 2005/07/11

Updated: 2018/07/20

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:egroupware, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2005/07/10

Vulnerability Publication Date: 2005/06/29

Exploitable With

Metasploit (PHP XML-RPC Arbitrary Code Execution)

Reference Information

CVE: CVE-2005-1921

DSA: 747