The specific version of PHP that the system is running is reportedly affected by the following vulnerabilities:
PHP contains an integer overflow condition in the php_filter_encode_url() function in ext/filter/sanitizing_filters.c. The issue is triggered as user-supplied input is not properly validated. This may allow a remote attacker to cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code. (CVE-2016-4345)
PHP contains an integer overflow condition in ext/standard/string.c. The issue is triggered as user-supplied input is not properly validated. This may allow a remote attacker to cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code. (CVE-2016-4346)
Binary data 802029.prm