Debian DSA-747-1 : egroupware - input validation error

high Nessus Plugin ID 18662

Synopsis

The remote Debian host is missing a security-related update.

Description

A vulnerability has been identified in the xmlrpc library included in the egroupware package. This vulnerability could lead to the execution of arbitrary commands on the server running egroupware.

The old stable distribution (woody) did not include egroupware.

Solution

Upgrade the egroupware package.

For the current stable distribution (sarge), this problem is fixed in version 1.0.0.007-2.dfsg-2sarge1.

See Also

http://www.debian.org/security/2005/dsa-747

Plugin Details

Severity: High

ID: 18662

File Name: debian_DSA-747.nasl

Version: 1.22

Type: local

Agent: unix

Published: 7/11/2005

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:egroupware, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/10/2005

Vulnerability Publication Date: 6/29/2005

Exploitable With

Metasploit (PHP XML-RPC Arbitrary Code Execution)

Reference Information

CVE: CVE-2005-1921

DSA: 747