Several heap-based buffer overflows were found in PHP, the widely-used general-purpose scripting language, which may lead to information disclosure, memory corruption or other unspecified impact if a malformed file or other input is processed.
At the moment no CVE numbers have been assigned yet but PHP upstream intends to announce them later.
For Debian 7 Wheezy, these problems have been fixed in version 5.4.45-0+deb7u18.
We recommend that you upgrade your php5 packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/