php is vulnerable to arbitrary code execution. Multiple missing input sanitization flaws were discovered in PHP’s exif extension. A specially-crafted image file could cause the PHP interpreter to crash or, possibly, disclose portions of its memory when a PHP script tried to extract Exchangeable image file format (Exif) metadata from the image file.
lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
marc.info/?l=bugtraq&m=127680701405735&w=2
marc.info/?l=bugtraq&m=130497311408250&w=2
news.php.net/php.announce/79
secunia.com/advisories/36791
secunia.com/advisories/37412
secunia.com/advisories/37482
secunia.com/advisories/40262
support.apple.com/kb/HT3937
www.debian.org/security/2009/dsa-1940
www.mandriva.com/security/advisories?name=MDVSA-2009:302
www.openwall.com/lists/oss-security/2009/11/20/2
www.openwall.com/lists/oss-security/2009/11/20/3
www.osvdb.org/58186
www.php.net/ChangeLog-5.php
www.php.net/ChangeLog-5.php#5.2.11
www.php.net/releases/5_2_11.php
www.php.net/releases/5_3_1.php
www.redhat.com/security/updates/classification/#moderate
www.securitytracker.com/id?1022914
www.vupen.com/english/advisories/2009/3184
access.redhat.com/errata/RHSA-2010:0040
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7652
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9982