php is vulnerable to improper session management. The vulnerability exists as a previous security update introduced a bug into PHP session cookie handling. This could allow an attacker to stop a victim from viewing a vulnerable web site if the victim has first visited a malicious web page under the control of the attacker, and that page can set a cookie for the vulnerable web site.
rhn.redhat.com/errata/RHSA-2007-0889.html
secunia.com/advisories/26822
secunia.com/advisories/26838
secunia.com/advisories/26871
secunia.com/advisories/26895
secunia.com/advisories/26930
secunia.com/advisories/26967
secunia.com/advisories/27102
secunia.com/advisories/27351
secunia.com/advisories/27377
secunia.com/advisories/27545
secunia.com/advisories/27864
support.avaya.com/elmodocs2/security/ASA-2007-449.htm
www.gentoo.org/security/en/glsa/glsa-200710-02.xml
www.mandriva.com/security/advisories?name=MDKSA-2007:187
www.php.net/ChangeLog-5.php#5.2.4
www.php.net/releases/5_2_4.php
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2007-0888.html
www.redhat.com/support/errata/RHSA-2007-0890.html
www.redhat.com/support/errata/RHSA-2007-0891.html
www.trustix.org/errata/2007/0026/
www.ubuntu.com/usn/usn-549-2
access.redhat.com/errata/RHSA-2007:0917
issues.rpath.com/browse/RPL-1693
issues.rpath.com/browse/RPL-1702
launchpad.net/bugs/173043
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11028
usn.ubuntu.com/549-1/
www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html