SHARE
Facebook X Pinterest WhatsApp

PHP 5.3.5 and 5.2.17 out for critical flaw fix

Jan 7, 2011
php.gif

From the

Hope You’re Not on PHP 4.x

files:

If you’re running PHP on your webserver — and you probably are – you really need to update, NOW.

A critical DoS flaw in PHP that was first reported on December 30, 2010 has now been publicly fixed for all PHP users in the open source PHP 5.3.5 and 5.2.17 releases.

According to commercial PHP vendor Zend, the flaw is related to how PHP handleS an internal
conversion of floating
point numbers. An attacker could potential insert a malicious string into a web browser query string, which could then take down a web server.

Though the flaw has been fixed in the 5.3.x and 5.2.x PHP branches, according to Zend, this vulnerability is present on all versions of PHP including PHP 4.x and 5.x, on all Intel-based 32-bit PHP builds.

WOW.

Recommended for you...

Facebook Becomes Meta, But Did It Move Too Soon?
Rob Enderle
Oct 29, 2021
Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing
Rob Enderle
Sep 17, 2021
Why AMD Has Been So Successful: Mark Papermaster
Rob Enderle
Sep 9, 2021
Another Crazy Week in Cybersecurity
Paul Shread
Jul 2, 2021
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.