Debian Security Advisory DSA 1647-1 (php5)

Summary
The remote host is missing an update to php5 announced via advisory DSA 1647-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201647-1
Insight
Several vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-3658 Buffer overflow in the imageloadfont function allows a denial of service or code execution through a crafted font file. CVE-2008-3659 Buffer overflow in the memnstr function allows a denial of service or code execution via a crafted delimiter parameter to the explode function. CVE-2008-3660 Denial of service is possible in the FastCGI module by a remote attacker by making a request with multiple dots before the extension. For the stable distribution (etch), these problems have been fixed in version 5.2.0-8+etch13. For the testing (lenny) and unstable distribution (sid), these problems have been fixed in version 5.2.6-4. We recommend that you upgrade your php5 package.