Summary
The remote host is missing an update to php-smarty announced via advisory MDVSA-2009:052.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:052
Insight
A vulnerability has been identified and corrected in php-smarty:
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka php executed in templates
Affected: 2008.0, 2008.1, 2009.0, Corporate 4.0
Severity
Classification
-
CVE CVE-2008-4810 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities