![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.56289 |
Category: | Slackware Local Security Checks |
Title: | Slackware: Security Advisory (SSA:2006-045-07) |
Summary: | The remote host is missing an update for the 'php' package(s) announced via the SSA:2006-045-07 advisory. |
Description: | Summary: The remote host is missing an update for the 'php' package(s) announced via the SSA:2006-045-07 advisory. Vulnerability Insight: New php packages are available for Slackware 10.2 and -current to fix minor security issues. More details about these issues may be found on the PHP website: [link moved to references] Here are the details from the Slackware 10.2 ChangeLog: +--------------------------+ patches/packages/php-4.4.2-i486-1.tgz: Upgraded to php-4.4.2. Claims to fix 'a few small security issues'. For more information, see: [link moved to references] (* Security fix *) patches/packages/php-4.4.2-i486-2.tgz: Rebuilt the package to clean up some junk dotfiles that were installed in the / directory. Harmless, but sloppy... Thanks to Krzysztof Oledzki for pointing this out. patches/packages/php-4.4.2-i486-3.tgz: Fixed some more bugs from the 4.4.2 release... hopefully the third time is the charm. Replaced PEAR packages for which the 4.4.2 release contained incorrect md5sums: Archive_Tar-1.3.1, Console_Getopt-1.2, and HTML_Template_IT-1.1.3. (this last one was also not upgraded to the stable version that was released on 2005-11-01) Sorry to have delayed the advisories, but these bugs had to be fixed first. IMHO, the security issues are of dubious severity anyway, or a more aggressive approach would have been taken (though this would likely have caused a lot of people to upgrade to the broken -1 or -2 package revisions, so anyone who didn't know about this until now was probably saved a hassle.) Upgraded other PEAR modules to HTTP-1.4.0, Net_SMTP-1.2.8, and XML_RPC-1.4.5. Thanks again to Krzysztof Oledzki for the bug report. +--------------------------+ Affected Software/OS: 'php' package(s) on Slackware 10.2, Slackware current. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Copyright | Copyright (C) 2012 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |