gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
https://support.apple.com/HT204659
https://bugs.php.net/bug.php?id=67730
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://rhn.redhat.com/errata/RHSA-2014-1766.html
http://rhn.redhat.com/errata/RHSA-2014-1765.html
http://rhn.redhat.com/errata/RHSA-2014-1327.html
http://php.net/ChangeLog-5.php
http://lists.opensuse.org/opensuse-updates/2014-09/msg00024.html
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html