- Joined
- Jan 26, 2008
- Messages
- 17,835
An extremely serious security flaw has been discovered in PHP, requiring that all affected servers be updated as a matter of urgency.
The flaw allows a remote webserver running an affected version of PHP to be crashed using nothing more than a URL request.
If you are running a 64 bit version of PHP you are unaffected, but if you are running in 32 bit mode, or you are not sure, now would be a good time to drop everything and make sure that your server is not vulnerable, by installing the latest version of PHP either from php.net, or from your own webserver vendor. Zend Server has a hotfix available already.
Due to the massive impact of the flaw and the trivial way in which it can be exploited, news of this bug will spread rapidly so speed is of the essence in getting your server patched.
http://xenforo.com/community/threads/php-affected-by-critical-security-flaw.10108/
Copy this: http://www.php.net/distributions/test_bug53632.txt into "testbug.php" - upload it and via shell, run
Code:
php testbug.php
IF you're safe, you should get something like this;
mikey@aeon:~$ php testbug.php
Testing float behaviour. If this script hangs or terminates with an error message due to maximum execution time limit being reached, you should update your PHP installation asap!
For more information refer to <http://bugs.php.net/53632>.
Your system seems to be safe