News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Community News:
PHP Remote Exploit - Floating Point Issue Causes Freeze/Crash
January 06, 2011 @ 08:06:31

As reported by both The Register and Zend, there's a new remote exploit bug that possibly has something to do with the way 32-bit processors handle floating point numbers.

From Zend:

Due to the way the PHP runtime handles internal conversion of floating point numbers, it is possible for a remote attacker to bring down a web application simply by adding a specific parameter to a query string in their web browser.

The bug, found here on bugs.php.net, has been reproduced on Windows and 32-bit linux systems and can cause the server hang and/or crash as a result. The real issue comes from this bug on the x87 FPU design. The bug has already been fixed in the latest SVN versions (including 5.2 that was end-of-life recently). A release to fix the issue should be coming shortly.

0 comments voice your opinion now!
bug crash exploit floating point remote svn


blog comments powered by Disqus

Similar Posts

PEAR Blog: Welcome to new contributors

Pierre-Alain Joye's Blog: PHP Security Conference in Paris, 2007/01/29

Builder.com.au: PHP exploit code plants itself in GIF

Pierre-Alain Joye's Blog: Windows fixes release for Zip, fopen(,"rb") may not be binary safe

Mark Karpeles' Blog: SVN error 200030 It's PHP's fault!


Community Events





Don't see your event here?
Let us know!


series interview symfony package opinion community framework library tips api voicesoftheelephpant podcast list install deployment bugfix language release laravel introduction

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework