PHP is an HTML-embedded scripting language commonly used with the ApacheHTTP Server.It was found that PHP did not properly handle file names with a NULLcharacter. A remote attacker could possibly use this flaw to make a PHPscript access unexpected files and bypass intended file system accessrestrictions. (CVE-2006-7243)A flaw was found in PHP's SSL client's hostname identity check whenhandling certificates that contain hostnames with NULL bytes. If anattacker was able to get a carefully crafted certificate signed by atrusted Certificate Authority, the attacker could use the certificate toconduct man-in-the-middle attacks to spoof SSL servers. (CVE-2013-4248)It was found that the PHP SOAP parser allowed the expansion of external XMLentities during SOAP message parsing. A remote attacker could possibly usethis flaw to read arbitrary files that are accessible to a PHP applicationusing a SOAP extension. (CVE-2013-1643)This update fixes the following bugs:In addition, this update adds the following enhancement:Users of php are advised to upgrade to these updated packages, which fixthese bugs and add this enhancement. After installing the updated packages,the httpd daemon must be restarted for the update to take effect.