CERTA-2005-AVI-242
Vulnerability from certfr_avis - Published: 2005-07-01 - Updated: 2005-07-18None
Description
Une vulnérabilité, jugée critique, a été découverte dans l'implémentation PEAR XMLRPC de PHP. Cette vulnérabilité fait déjà l'objet de publications de code permettant son exploitation.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des
correctifs (cf. section Documentation).
Mettre à jour les applications PHP, dont les plus populaires disposent
d'un correctif («wordPress» et «Serendipity»).
Tous les systèmes exploitant PHP PEAR pour leurs applications.
Impacted products
| Vendor | Product | Description |
|---|
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eTous les syst\u00e8mes exploitant PHP PEAR pour leurs applications.\u003c/p\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9, jug\u00e9e critique, a \u00e9t\u00e9 d\u00e9couverte dans\nl\u0027impl\u00e9mentation PEAR XMLRPC de PHP. Cette vuln\u00e9rabilit\u00e9 fait d\u00e9j\u00e0\nl\u0027objet de publications de code permettant son exploitation.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation). \nMettre \u00e0 jour les applications PHP, dont les plus populaires disposent\nd\u0027un correctif (\u00abwordPress\u00bb et \u00abSerendipity\u00bb).\n",
"cves": [],
"initial_release_date": "2005-07-01T00:00:00",
"last_revision_date": "2005-07-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200507-15 pour php du 15 juillet 2005 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200507-15.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-746 pour phpgroupware du 13 juillet 2005 :",
"url": "http://www.debian.org/security/2005/dsa-746"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200507-06 pour tikiwiki du 06 juillet 2005 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200507-06.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SGI 20050703-01-U du 15 juillet 2005 :",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:564 du 07 juillet 2005 :",
"url": "http://rhn.redhat.com/errata/RHSA-2005-564.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200507-07 pour phpwebsite du 10 juillet 2005 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200507-07.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200507-02 du 04 juillet 2005 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200507-02.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-745 pour drupal du 10 juillet 2005 :",
"url": "http://www.debian.org/security/2005/dsa-745"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD pour pear-XML_RPC du 03 juillet 2005 :",
"url": "http://www.vuxml.org/freebsd/pkg-pear-XML_RPC.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SA-2005:041 du 08 juillet 2005 :",
"url": "http://www.novell.com/linux/security/advisories/2005_41_php_pear.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenBSD pour php4-pear du 12 juillet 2005 :",
"url": "http://www.vuxml.org/openbsd/pkg-php4-pear.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de Mandriva du 30 juin 2005 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:109"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-747 pour egroupware du 10 juillet 2005 :",
"url": "http://www.debian.org/security/2005/dsa-747"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200507-01 du 03 juillet 2005 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200507-01.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200507-08 pour phpgroupware et egroupware du 10 juillet 2005 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200507-08.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de Hardened-PHP du 29 juin 2005 :",
"url": "http://www.hardened-php.net/advisory-022005.php"
}
],
"reference": "CERTA-2005-AVI-242",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-07-01T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200507-02.",
"revision_date": "2005-07-04T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 FreeBSD.",
"revision_date": "2005-07-05T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200507-06.",
"revision_date": "2005-07-07T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 RedHat RHSA-2005:564, SUSE SUSE-SA-2005:041, Debian DSA-745, Debian DSA-747, Gentoo GLSA 200507-06, Gentoo GLSA 200507-07 et Gentoo GLSA 200507-08.",
"revision_date": "2005-07-11T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 OpenBSD.",
"revision_date": "2005-07-13T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian DSA-746.",
"revision_date": "2005-07-15T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 SGI 20050703-01-U.",
"revision_date": "2005-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9s dans PHP PEAR",
"vendor_advisories": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…