Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.53995
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-147-1 (php4-universe)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to php4-universe
announced via advisory USN-147-1.

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected: libapache2-mod-php4 php4-pear

A remote code execution vulnerability has been discovered in the XMLRPC module
of the PEAR (PHP Extension and Application Repository) extension of PHP. By
sending specially crafted XMLRPC requests to an affected web server, a remote
attacker could exploit this to execute arbitrary code with the web server's
privileges.

In Ubuntu 5.04 (Hoary Hedgehog), the PEAR extension is unsupported (it is
contained in the php4-universe package which is part of universe). However,
since this is a highly critical vulnerability, that package was fixed as well.

Please note that many applications contain a copy of the affected XMLRPC code,
which must be fixed separately. The following packages may also be affected,
but are unsupported in Ubuntu:

- drupal - wordpress - phpwiki - horde3 - ewiki - egroupware - phpgroupware

These packages might be fixed by the community later.

The following common third party applications are affected as well, but
not packaged for Ubuntu:

- Serendipity - Postnuke - tikiwiki - phpwebsite

If you run any affected software, please upgrade them as soon as possible to
protect your server.

Solution:
The problem can be corrected by upgrading the affected package to
version 4:4.3.8-3ubuntu7.9 (for Ubuntu 4.10), or 4:4.3.10-10ubuntu3.1
(for Ubuntu 5.04). In general, a standard system upgrade is
sufficient to effect the necessary changes.

https://secure1.securityspace.com/smysecure/catid.html?in=USN-147-1

Risk factor : High

CVSS Score:
7.5

Cross-Ref: BugTraq ID: 14088
Common Vulnerability Exposure (CVE) ID: CVE-2005-1921
http://www.securityfocus.com/bid/14088
Bugtraq: 20050629 Advisory 02/2005: Remote code execution in Serendipity (Google Search)
http://marc.info/?l=bugtraq&m=112008638320145&w=2
Bugtraq: 20050629 [DRUPAL-SA-2005-003] Drupal 4.6.2 / 4.5.4 fixes critical XML-RPC issue (Google Search)
http://marc.info/?l=bugtraq&m=112015336720867&w=2
Debian Security Information: DSA-745 (Google Search)
http://www.debian.org/security/2005/dsa-745
Debian Security Information: DSA-746 (Google Search)
http://www.debian.org/security/2005/dsa-746
Debian Security Information: DSA-747 (Google Search)
http://www.debian.org/security/2005/dsa-747
Debian Security Information: DSA-789 (Google Search)
http://www.debian.org/security/2005/dsa-789
http://security.gentoo.org/glsa/glsa-200507-01.xml
http://security.gentoo.org/glsa/glsa-200507-06.xml
http://security.gentoo.org/glsa/glsa-200507-07.xml
HPdes Security Advisory: HPSBTU02083
http://www.securityfocus.com/archive/1/419064/100/0/threaded
HPdes Security Advisory: SSRT051069
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
http://pear.php.net/package/XML_RPC/download/1.3.1
http://www.gulftech.org/?node=research&article_id=00087-07012005
http://www.hardened-php.net/advisory-022005.php
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350
http://www.redhat.com/support/errata/RHSA-2005-564.html
http://securitytracker.com/id?1015336
http://secunia.com/advisories/15810
http://secunia.com/advisories/15852
http://secunia.com/advisories/15855
http://secunia.com/advisories/15861
http://secunia.com/advisories/15872
http://secunia.com/advisories/15883
http://secunia.com/advisories/15884
http://secunia.com/advisories/15895
http://secunia.com/advisories/15903
http://secunia.com/advisories/15904
http://secunia.com/advisories/15916
http://secunia.com/advisories/15917
http://secunia.com/advisories/15922
http://secunia.com/advisories/15944
http://secunia.com/advisories/15947
http://secunia.com/advisories/15957
http://secunia.com/advisories/16001
http://secunia.com/advisories/16339
http://secunia.com/advisories/16693
http://secunia.com/advisories/17440
http://secunia.com/advisories/17674
http://secunia.com/advisories/18003
SuSE Security Announcement: SUSE-SA:2005:041 (Google Search)
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
SuSE Security Announcement: SUSE-SA:2005:049 (Google Search)
http://www.novell.com/linux/security/advisories/2005_49_php.html
SuSE Security Announcement: SUSE-SA:2005:051 (Google Search)
http://marc.info/?l=bugtraq&m=112605112027335&w=2
SuSE Security Announcement: SUSE-SR:2005:018 (Google Search)
http://www.novell.com/linux/security/advisories/2005_18_sr.html
http://www.vupen.com/english/advisories/2005/2827
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.