An attacker can exploit this issue by sending a small number of specially crafted webform form posts to an affected application.Successful exploits will attackers to disrupt the availability of sites that use PHP.PHP 5.3.8 and prior versions are vulnerable.
Vendor Status:
Vendor as issued an updated vulnerability.