php -- strip_tags cross-site scripting vulnerability

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://security.e-matters.de/advisories/122004.html http://marc.theaimsgroup.com/?l=bugtraq&m=108981589117423 http://www.vuxml.org/freebsd/edf61c61-0f07-11d9-8393-000103ccf9d6.html
Insight
The following packages are affected: mod_php4-twig php4 php4-cgi php4-cli php4-dtc php4-horde php4-nms mod_php4 php5 php5-cgi php5-cli mod_php5 CVE-2004-0595 The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.