Slackware 10.0 / 10.1 / 8.1 / 9.0 / 9.1 / current : PHP (SSA:2005-242-02)

high Nessus Plugin ID 19859

Synopsis

The remote Slackware host is missing a security update.

Description

New PHP packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, and -current to fix security issues. PHP has been relinked with the shared PCRE library to fix an overflow issue with PHP's builtin PRCE code, and PEAR::XMLRPC has been upgraded to version 1.4.0 which eliminates the eval() function. The eval() function is believed to be insecure as implemented, and would be difficult to secure. Note that these new packages now require that the PCRE package be installed, so be sure to get the new package from the patches/packages/ directory if you don't already have it. A new version of this (6.3) was also issued today, so be sure that is the one you install.

Solution

Update the affected php package.

See Also

http://www.nessus.org/u?3f72b2a9

Plugin Details

Severity: High

ID: 19859

File Name: Slackware_SSA_2005-242-02.nasl

Version: 1.18

Type: local

Published: 10/5/2005

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:php, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:10.0, cpe:/o:slackware:slackware_linux:10.1, cpe:/o:slackware:slackware_linux:8.1, cpe:/o:slackware:slackware_linux:9.0, cpe:/o:slackware:slackware_linux:9.1

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Exploit Ease: No known exploits are available

Patch Publication Date: 8/30/2005

Vulnerability Publication Date: 8/15/2005

Reference Information

CVE: CVE-2005-2491, CVE-2005-2498

SSA: 2005-242-02