Summary
The remote host is missing updates announced in
advisory GLSA 200508-13.
Solution
All PEAR-XML_RPC users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-php/PEAR-XML_RPC-1.4.0'
All phpxmlrpc users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-php/phpxmlrpc-1.2-r1'
http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200508-13 http://bugs.gentoo.org/show_bug.cgi?id=102378
http://bugs.gentoo.org/show_bug.cgi?id=102576
http://www.hardened-php.net/advisory_142005.66.html http://www.hardened-php.net/advisory_152005.67.html
Insight
The PEAR XML-RPC and phpxmlrpc libraries allow remote attackers to execute arbitrary PHP script commands.
Severity
Classification
-
CVE CVE-2005-2498 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities