php is vulnerable to spoofing attacks. It was discovered that PHP was affected by the previously published “null prefix attack”, caused by incorrect handling of NUL characters in X.509 certificates. If an attacker is able to get a carefully-crafted certificate signed by a trusted Certificate Authority, the attacker could use the certificate during a man-in-the-middle attack and potentially confuse PHP into accepting it by mistake.
lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
marc.info/?l=bugtraq&m=127680701405735&w=2
marc.info/?l=bugtraq&m=130497311408250&w=2
secunia.com/advisories/36791
secunia.com/advisories/37482
secunia.com/advisories/40262
support.apple.com/kb/HT3937
www.debian.org/security/2009/dsa-1940
www.osvdb.org/58185
www.php.net/ChangeLog-5.php#5.2.11
www.php.net/releases/5_2_11.php
www.redhat.com/security/updates/classification/#moderate
www.securitytracker.com/id?1022914
www.vupen.com/english/advisories/2009/3184
access.redhat.com/errata/RHSA-2010:0040
exchange.xforce.ibmcloud.com/vulnerabilities/53334
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10438
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7394