The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger “information disclosure, double-free and negative reference index array underflow” results.
lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html
lists.opensuse.org/opensuse-updates/2015-02/msg00079.html
marc.info/?l=bugtraq&m=110314318531298&w=2
msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html
www.hardened-php.net/advisories/012004.txt
www.mandriva.com/security/advisories?name=MDKSA-2004:151
www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html
www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
www.php.net/release_4_3_10.php
www.redhat.com/support/errata/RHSA-2004-687.html
www.redhat.com/support/errata/RHSA-2005-032.html
www.redhat.com/support/errata/RHSA-2005-816.html
www.securityfocus.com/advisories/9028
bugzilla.fedora.us/show_bug.cgi?id=2344
exchange.xforce.ibmcloud.com/vulnerabilities/18514
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511