Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.54451
Category:Fedora Local Security Checks
Title:Fedora Legacy Security Advisory FLSA-2005:163559
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory FLSA-2005:163559.

A bug was discovered in the PEAR XML-RPC Server package included in PHP.
If a PHP script is used which implements an XML-RPC Server using the
PEAR XML-RPC package, then it is possible for a remote attacker to
construct an XML-RPC request which can cause PHP to execute arbitrary
PHP commands as the 'apache' user. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-1921 to
this issue.

A race condition in temporary file handling was discovered in the shtool
script installed by PHP. If a third-party PHP module which uses shtool
was compiled as root, a local user may be able to modify arbitrary
files. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2005-1751 to this issue.

Users of PHP should upgrade to these updated packages, which contain
backported fixes for these issues.

Affected platforms:
Fedora Core 1
Fedora Core 2

Solution:
http://www.securityspace.com/smysecure/catid.html?in=FLSA-2005:163559

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-1751
BugTraq ID: 13767
http://www.securityfocus.com/bid/13767
Debian Security Information: DSA-789 (Google Search)
http://www.debian.org/security/2005/dsa-789
http://www.gentoo.org/security/en/glsa/glsa-200506-08.xml
http://bugs.gentoo.org/show_bug.cgi?id=93782
http://www.zataz.net/adviso/shtool-05252005.txt
http://marc.info/?l=bugtraq&m=111955937622637&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A345
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9639
http://www.redhat.com/support/errata/RHSA-2005-564.html
http://securitytracker.com/id?1014059
http://secunia.com/advisories/15496
http://secunia.com/advisories/15668
Common Vulnerability Exposure (CVE) ID: CVE-2005-1921
1015336
http://securitytracker.com/id?1015336
14088
http://www.securityfocus.com/bid/14088
15810
http://secunia.com/advisories/15810
15852
http://secunia.com/advisories/15852
15855
http://secunia.com/advisories/15855
15861
http://secunia.com/advisories/15861
15872
http://secunia.com/advisories/15872
15883
http://secunia.com/advisories/15883
15884
http://secunia.com/advisories/15884
15895
http://secunia.com/advisories/15895
15903
http://secunia.com/advisories/15903
15904
http://secunia.com/advisories/15904
15916
http://secunia.com/advisories/15916
15917
http://secunia.com/advisories/15917
15922
http://secunia.com/advisories/15922
15944
http://secunia.com/advisories/15944
15947
http://secunia.com/advisories/15947
15957
http://secunia.com/advisories/15957
16001
http://secunia.com/advisories/16001
16339
http://secunia.com/advisories/16339
16693
http://secunia.com/advisories/16693
17440
http://secunia.com/advisories/17440
17674
http://secunia.com/advisories/17674
18003
http://secunia.com/advisories/18003
20050629 Advisory 02/2005: Remote code execution in Serendipity
http://marc.info/?l=bugtraq&m=112008638320145&w=2
20050629 [DRUPAL-SA-2005-003] Drupal 4.6.2 / 4.5.4 fixes critical XML-RPC issue
http://marc.info/?l=bugtraq&m=112015336720867&w=2
ADV-2005-2827
http://www.vupen.com/english/advisories/2005/2827
DSA-745
http://www.debian.org/security/2005/dsa-745
DSA-746
http://www.debian.org/security/2005/dsa-746
DSA-747
http://www.debian.org/security/2005/dsa-747
DSA-789
GLSA-200507-01
http://security.gentoo.org/glsa/glsa-200507-01.xml
GLSA-200507-06
http://security.gentoo.org/glsa/glsa-200507-06.xml
GLSA-200507-07
http://security.gentoo.org/glsa/glsa-200507-07.xml
HPSBTU02083
http://www.securityfocus.com/archive/1/419064/100/0/threaded
MDKSA-2005:109
http://www.mandriva.com/security/advisories?name=MDKSA-2005:109
RHSA-2005:564
SSRT051069
SUSE-SA:2005:041
http://www.novell.com/linux/security/advisories/2005_41_php_pear.html
SUSE-SA:2005:049
http://www.novell.com/linux/security/advisories/2005_49_php.html
SUSE-SA:2005:051
http://marc.info/?l=bugtraq&m=112605112027335&w=2
SUSE-SR:2005:018
http://www.novell.com/linux/security/advisories/2005_18_sr.html
http://pear.php.net/package/XML_RPC/download/1.3.1
http://sourceforge.net/project/showfiles.php?group_id=87163
http://sourceforge.net/project/shownotes.php?release_id=338803
http://www.ampache.org/announce/3_3_1_2.php
http://www.drupal.org/security/drupal-sa-2005-003/advisory.txt
http://www.gulftech.org/?node=research&article_id=00087-07012005
http://www.hardened-php.net/advisory-022005.php
oval:org.mitre.oval:def:11294
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11294
oval:org.mitre.oval:def:350
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A350
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.