PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.
Not vulnerable. These issues did not affect the versions of PHP as
shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or
Red Hat Application Stack 1.