Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://security.e-matters.de/advisories/122004.html http://marc.theaimsgroup.com/?l=bugtraq&m=108981589117423 http://www.vuxml.org/freebsd/edf61c61-0f07-11d9-8393-000103ccf9d6.html
Insight
The following packages are affected:
mod_php4-twig
php4
php4-cgi
php4-cli
php4-dtc
php4-horde
php4-nms
mod_php4
php5
php5-cgi
php5-cli
mod_php5
CVE-2004-0595
The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.
Severity
Classification
-
CVE CVE-2004-0595 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities