Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://www.gulftech.org/?node=research&article_id=00087-07012005 http://www.hardened-php.net/advisory-022005.php
http://www.vuxml.org/freebsd/523fad14-eb9d-11d9-a8bd-000cf18bbe54.html
Insight
The following package is affected: pear-XML_RPC
CVE-2005-1921
PEAR XML_RPC 1.3.0 and earlier, as used in products such as WordPress, Serendipity, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
Severity
Classification
-
CVE CVE-2005-1921 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities