News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Community News:
PHP Remote Exploit - Floating Point Issue Causes Freeze/Crash
January 06, 2011 @ 08:06:31

As reported by both The Register and Zend, there's a new remote exploit bug that possibly has something to do with the way 32-bit processors handle floating point numbers.

From Zend:

Due to the way the PHP runtime handles internal conversion of floating point numbers, it is possible for a remote attacker to bring down a web application simply by adding a specific parameter to a query string in their web browser.

The bug, found here on bugs.php.net, has been reproduced on Windows and 32-bit linux systems and can cause the server hang and/or crash as a result. The real issue comes from this bug on the x87 FPU design. The bug has already been fixed in the latest SVN versions (including 5.2 that was end-of-life recently). A release to fix the issue should be coming shortly.

0 comments voice your opinion now!
bug crash exploit floating point remote svn


blog comments powered by Disqus

Similar Posts

Christopher Jones\' Blog: How to Use IIS, PHP and Oracle

LWN.net: Remote file inclusion vulnerabilities

Mike\'s Blog: PECL HTTP module - A nasty bug and a new example

PEAR Blog: PEAR Development on Github

International PHP Magazine: IPM Poll Question: Which One is Most Dangerous?


Community Events





Don't see your event here?
Let us know!


framework refactor opinion unittest developer introduction language testing install code list symfony2 configure series podcast threedevsandamaybe laravel release community interview

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework