Security Enhancements and Fixes in PHP 4.4.7:
- Fixed CVE-2007-1001, GD wbmp used with invalid image size (by Ivan Fratric)
- Fixed asciiz byte truncation inside mail() (MOPB-33 by Stefan Esser)
- Fixed a bug in mb_parse_str() that can be used to activate register_globals (MOPB-26 by Stefan Esser)
- Fixed unallocated memory access/double free in in array_user_key_compare() (MOPB-24 by Stefan Esser)
- Fixed a double free inside session_regenerate_id() (MOPB-22 by Stefan Esser)
- Added missing open_basedir & safe_mode checks to zip:// and bzip:// wrappers. (MOPB-21 by Stefan Esser).
- Limit nesting level of input variables with max_input_nesting_level as fix for (MOPB-03 by Stefan Esser)
- XSS in phpinfo() (MOPB-8 by Stefan Esser)
- Fixed CRLF injection inside ftp_putcmd(). (by loveshell[at]Bug.Center.Team)
- Fixed a possible super-global overwrite inside import_request_variables(). (by Stefano Di Paola, Stefan Esser)
- Fixed a remotely trigger-able buffer overflow inside bundled libxmlrpc library. (by Stanislav Malyshev)
While majority of the issues outlined above are local, few issues such as the XML-RPC overflows can be triggered remotely and therefor should be considered critical. If you use the XML-RPC extension consider upgrading as soon as possible.
Other improvements of PHP 4.4.7 include:
- About 10 bug fixes.
