GLSA-201006-13 : Smarty: Multiple vulnerabilities

critical Nessus Plugin ID 46793



The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-201006-13 (Smarty: Multiple vulnerabilities)

Multiple vulnerabilities have been discovered in Smarty:
The vendor reported that the modifier.regex_replace.php plug-in contains an input sanitation flaw related to the ASCII NUL character (CVE-2008-1066).
The vendor reported that the
_expand_quoted_text() function in libs/Smarty_Compiler.class.php contains an input sanitation flaw via multiple vectors (CVE-2008-4810, CVE-2008-4811).
Nine:Situations:Group::bookoo reported that the smarty_function_math() function in libs/plugins/function.math.php contains input sanitation flaw (CVE-2009-1669).
Impact :

These issues might allow a remote attacker to execute arbitrary PHP code.
Workaround :

There is no known workaround at this time.


All Smarty users should upgrade to an unaffected version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-php/smarty-2.6.23' NOTE: This is a legacy GLSA. Updates for all affected architectures are available since June 2, 2009. It is likely that your system is already no longer affected by this issue.

See Also

Plugin Details

Severity: Critical

ID: 46793

File Name: gentoo_GLSA-201006-13.nasl

Version: 1.12

Type: local

Published: 6/3/2010

Updated: 1/6/2021

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:smarty, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/2/2010

Reference Information

CVE: CVE-2008-1066, CVE-2008-4810, CVE-2008-4811, CVE-2009-1669

BID: 28105, 31862, 34918

GLSA: 201006-13

CWE: 20, 94, 264