Debian DSA-789-1 : php4 - several vulnerabilities

High Nessus Plugin ID 19532


The remote Debian host is missing a security-related update.


Several security related problems have been found in PHP4, the server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems :

- CAN-2005-1751 Eric Romang discovered insecure temporary files in the shtool utility shipped with PHP that can exploited by a local attacker to overwrite arbitrary files. Only this vulnerability affects packages in oldstable.

- CAN-2005-1921

GulfTech has discovered that PEAR XML_RPC is vulnerable to a remote PHP code execution vulnerability that may allow an attacker to compromise a vulnerable server.

- CAN-2005-2498

Stefan Esser discovered another vulnerability in the XML-RPC libraries that allows injection of arbitrary PHP code into eval() statements.


Upgrade the PHP packages.

For the old stable distribution (woody) these problems have been fixed in version 4.1.2-7.woody5.

For the stable distribution (sarge) these problems have been fixed in version 4.3.10-16.

See Also

Plugin Details

Severity: High

ID: 19532

File Name: debian_DSA-789.nasl

Version: 1.21

Type: local

Agent: unix

Published: 2005/08/30

Updated: 2018/07/20

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:php4, cpe:/o:debian:debian_linux:3.0, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2005/08/29

Vulnerability Publication Date: 2005/05/25

Exploitable With

Metasploit (PHP XML-RPC Arbitrary Code Execution)

Reference Information

CVE: CVE-2005-1751, CVE-2005-1759, CVE-2005-1921, CVE-2005-2498

DSA: 789