News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Community News:
PHP Remote Exploit - Floating Point Issue Causes Freeze/Crash
January 06, 2011 @ 08:06:31

As reported by both The Register and Zend, there's a new remote exploit bug that possibly has something to do with the way 32-bit processors handle floating point numbers.

From Zend:

Due to the way the PHP runtime handles internal conversion of floating point numbers, it is possible for a remote attacker to bring down a web application simply by adding a specific parameter to a query string in their web browser.

The bug, found here on bugs.php.net, has been reproduced on Windows and 32-bit linux systems and can cause the server hang and/or crash as a result. The real issue comes from this bug on the x87 FPU design. The bug has already been fixed in the latest SVN versions (including 5.2 that was end-of-life recently). A release to fix the issue should be coming shortly.

0 comments voice your opinion now!
bug crash exploit floating point remote svn


blog comments powered by Disqus

Similar Posts

PHPRiot.com: Geocoding with PHP and the Google Maps API

PHPClasses.org: PHP security exploit with GIF images

XPertDeveloper.com: Is Your PHP Application Affected by the Y2K38?

PEAR Blog: SVN and PEAR

Cyberlot's Blog: PHP bugs, whos responsible? Do they even read them?


Community Events





Don't see your event here?
Let us know!


conference zendserver list community language series introduction api framework development deployment symfony threedevsandamaybe bugfix release interview podcast laravel tips code

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework