Description: | Summary: The remote host is missing an update for the Debian 'php4' package(s) announced via the DSA-789-1 advisory.
Vulnerability Insight: Several security related problems have been found in PHP4, the server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems:
CAN-2005-1751
Eric Romang discovered insecure temporary files in the shtool utility shipped with PHP that can exploited by a local attacker to overwrite arbitrary files. Only this vulnerability affects packages in oldstable.
CAN-2005-1921
GulfTech has discovered that PEAR XML_RPC is vulnerable to a remote PHP code execution vulnerability that may allow an attacker to compromise a vulnerable server.
CAN-2005-2498
Stefan Esser discovered another vulnerability in the XML-RPC libraries that allows injection of arbitrary PHP code into eval() statements.
For the old stable distribution (woody) these problems have been fixed in version 4.1.2-7.woody5.
For the stable distribution (sarge) these problems have been fixed in version 4.3.10-16.
For the unstable distribution (sid) these problems have been fixed in version 4.4.0-2.
We recommend that you upgrade your PHP packages.
Affected Software/OS: 'php4' package(s) on Debian 3.0, Debian 3.1.
Solution: Please install the updated package(s).
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|