Description: | Summary: The remote host is missing an update for the 'php5' package(s) announced via the SSA:2005-251-04 advisory.
Vulnerability Insight: A new php5 package is available for Slackware 10.1 in /testing to fix security issues. PHP has been relinked with the shared PCRE library to fix an overflow issue with PHP's builtin PRCE code, and PEAR::XMLRPC has been upgraded to version 1.4.0 which eliminates the eval() function. The eval() function is believed to be insecure as implemented, and would be difficult to secure.
Note that this new package now requires that the PCRE package be installed, so be sure to get the new package from the patches/packages/ directory if you don't already have it.
More details about these issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
[links moved to references]
Here are the details from the Slackware 10.1 ChangeLog: +--------------------------+ testing/packages/php-5.0.5/php-5.0.5-i486-1.tgz: Upgraded to php-5.0.5, which fixes security issues with XML-RPC and PCRE. This new package now links with the system's shared PCRE library, so be sure you have the new PCRE package from patches/packages/ installed. Ordinarily packages in /testing are not considered supported, but several people have written to say that they are using php5 from /testing in a production environment and would like to see an updated package, so here it is. The package in /testing was replaced in /testing rather than putting it under /patches to avoid any problems with automatic upgrade tools replacing php-4 packages with this one. For more information on the security issues fixed, see: [links moved to references] (* Security fix *) +--------------------------+
Affected Software/OS: 'php5' package(s) on Slackware 10.1.
Solution: Please install the updated package(s).
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|