Hide Forgot
http://www.php.net/releases/5_2_4.php # Fixed integer overflow in str[c]spn(). (Reported by Mattias Bengtsson)
The only effect of this bug is to cause the process to read from a random segment of memory, if a large "length" parameter is passed to the strspn/strcspn function, which is under the control of the script author. This bug has no security impact.