Integer overflow in the str_replace function in PHP 4.4.5 and PHP 5.2.1 allows context-dependent attackers to have an unknown impact via a single character search string in conjunction with a single character replacement string, which causes an "off by one overflow."
https://exchange.xforce.ibmcloud.com/vulnerabilities/33768
http://www.vupen.com/english/advisories/2007/2374
http://www.vupen.com/english/advisories/2007/1991
http://www.php-security.org/MOPB/MOPB-39-2007.html
http://secunia.com/advisories/25850
http://secunia.com/advisories/25423
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506