The php_binary serialization handler in the session extension in PHP before
4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain
sensitive information (memory contents) via a serialized variable entry with a
large length value, which triggers a buffer over-read.
This bug is further documented in the "Month of PHP Bugs".
The MOPB comment #9 in bug #230556 indicates that this bug should be fixed in
#228858, but I see no reference to it over there.
Thanks for the report. The issue were fixed under the guies of CVE-2007-0906 -
CVE-2007-1380 was allocated later, once more specific details about the issues
covered in CVE-2007-0906 were available. The advisories have been updated to
reference the new CVE name:
*** This bug has been marked as a duplicate of 240157 ***