The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511
https://exchange.xforce.ibmcloud.com/vulnerabilities/18514
https://bugzilla.fedora.us/show_bug.cgi?id=2344
http://www.securityfocus.com/advisories/9028
http://www.redhat.com/support/errata/RHSA-2005-816.html
http://www.redhat.com/support/errata/RHSA-2005-032.html
http://www.redhat.com/support/errata/RHSA-2004-687.html
http://www.php.net/release_4_3_10.php
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html
http://www.mandriva.com/security/advisories?name=MDKSA-2004:151
http://www.hardened-php.net/advisories/012004.txt
http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html
http://marc.info/?l=bugtraq&m=110314318531298&w=2
http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html