This alert was generated using only banner information. It may be a false positive.
The PHP development team would like to announce the immediate availability of PHP 5.2.3. This release continues to improve the security and the stability of the 5.X branch as well as addressing two regressions introduced by the previous 5.2 releases. These regressions relate to the timeout handling over non-blocking SSL connections and the lack of HTTP_RAW_POST_DATA in certain conditions. All users are encouraged to upgrade to this release.
Security Enhancements and Fixes in PHP 5.2.3:
- Fixed an integer overflow inside chunk_split() (by Gerhard Wagner, CVE-2007-2872)
- Fixed possible infinite loop in imagecreatefrompng. (by Xavier Roche, CVE-2007-2756)
- Fixed ext/filter Email Validation Vulnerability (MOPB-45 by Stefan Esser, CVE-2007-1900)
- Fixed bug #41492 (open_basedir/safe_mode bypass inside realpath()) (by bugs dot php dot net at chsc dot dk)
- Improved fix for CVE-2007-1887 to work with non-bundled sqlite2 lib.
- Added mysql_set_charset() to allow runtime altering of connection encoding.
Affected PHP versions (up to 5.2.2).
- Upgrade PHP to the latest version.
- WordPress Plugin WP-Predict 'predictId' Parameter Blind SQL Injection (1.0)
- Joomla! Core Cross-Site Scripting (1.5.0 - 3.8.3)
- WordPress Plugin Portfolio Gallery-Photo Gallery Unspecified Vulnerability (2.3.0)
- WordPress Plugin Simple Security Multiple Cross-Site Scripting Vulnerabilities (1.1.5)
- WordPress 3.7.x Multiple Vulnerabilities (3.7 - 3.7.21)