Debian DSA-746-1 : phpgroupware - input validation error

high Nessus Plugin ID 19195

Synopsis

The remote Debian host is missing a security-related update.

Description

A vulnerability had been identified in the xmlrpc library included with phpgroupware, a web-based application including email, calendar and other groupware functionality. This vulnerability could lead to the execution of arbitrary commands on the server running phpgroupware.

The security team is continuing to investigate the version of phpgroupware included with the old stable distribution (woody). At this time we recommend disabling phpgroupware or upgrading to the current stable distribution (sarge).

Solution

Upgrade the phpgroupware package.

For the current stable distribution (sarge) this problem has been fixed in version 0.9.16.005-3.sarge0.

See Also

http://www.debian.org/security/2005/dsa-746

Plugin Details

Severity: High

ID: 19195

File Name: debian_DSA-746.nasl

Version: 1.17

Type: local

Agent: unix

Published: 7/14/2005

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:phpgroupware, cpe:/o:debian:debian_linux:3.1

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/13/2005

Exploitable With

Metasploit (PHP XML-RPC Arbitrary Code Execution)

Reference Information

CVE: CVE-2005-1921

DSA: 746