+++ This bug was initially created as a clone of Bug #204993 +++
(Description from MITRE)
Multiple heap-based buffer overflows in the (1) str_repeat and (2)
wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when
used on a 64-bit system, have unspecified impact and attack vectors, a
different vulnerability than CVE-2006-1990.
This is the result of using int = size_t * sizt_t where int is 32 bits
and size_t is 64 bits. The odds of exploiting this remotely are slim
as you would probably have to send 2 gigs of data to a broken app.
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.