PHP 'substr_replace()' Use After Free Vulnerability

Summary
This host is running PHP and is prone to Use After Free vulnerability.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code in the context of a web server. Failed attempts will likely result in denial-of-service conditions. Impact Level: Network
Solution
Upgrade to PHP version 5.3.7 or later. For updates refer to http://www.php.net/downloads.php
Insight
The flaw is due to passing the same variable multiple times to the 'substr_replace()' function, which makes the PHP to use the same pointer in three variables inside the function.
Affected
PHP version 5.3.6 and prior.
References