SUSE-SA:2005:041: php/pear XML::RPC

High Nessus Plugin ID 19250


The remote host is missing a vendor-supplied security patch


The remote host is missing the patch for the advisory SUSE-SA:2005:041 (php/pear XML::RPC).

A bug in the PEAR::XML_RPC library allowed remote attackers to pass arbitrary PHP code to the eval() function.

The updated php packages fix the XML::RPC bug, however several third party PHP packages include a copy of the problematic XML::RPC code itself and might be still vulnerable after the update.

Please check their respective websites whether the package is vulnerable.

The following projects are known to include the XML::RPC code:
- tikiwiki
- postnuke
- drupal
- b2evolution
- b2
- phpGroupWare
- eGroupware
- Serendipity Weblog
- phpAdsNew
- Max Media Manager

This issue is tracked by the Mitre CVE ID CVE-2005-1921.

The bug in the SUSE php packages affects SUSE Linux versions from 8.2 up to 9.3, SUSE Linux Enterprise Server 9 and Open Enterprise Server.

php4 on SUSE Linux Enterprise Server 8 is not affected, since it was not shipping the XML::RPC extension.


Plugin Details

Severity: High

ID: 19250

File Name: suse_SA_2005_041.nasl

Version: $Revision: 1.5 $

Agent: unix

Published: 2005/07/20

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

Required KB Items: Host/SuSE/rpm-list