openSUSE Security Update : php5-pear-mail (openSUSE-SU-2010:0909-1)

high Nessus Plugin ID 50369

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

Passing specially crafted $from and $recepient arguments to php5-pear-mail's sendmail.php allowed attackers to inject shell code (CVE-2009-4023, CVE-2009-4111).

Solution

Update the affected php5-pear-mail package.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=558259

https://bugzilla.novell.com/show_bug.cgi?id=630334

https://lists.opensuse.org/opensuse-updates/2010-10/msg00038.html

Plugin Details

Severity: High

ID: 50369

File Name: suse_11_1_php5-pear-mail-101022.nasl

Version: 1.7

Type: local

Agent: unix

Published: 10/28/2010

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:php5-pear-mail, cpe:/o:novell:opensuse:11.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 10/22/2010

Reference Information

CVE: CVE-2009-4023, CVE-2009-4111

CWE: 94