Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

DoS attack found in PHP thanks to x87 FP

yuhong (1378501) writes | more than 3 years ago

PHP 1

yuhong writes "Thanks to the fact that in x87 all floating point values stored in registers are 80-bit, a DoS attack has been found where converting the number 2.2250738585072011e-308 using most 32-bit versions of PHP hangs the conversion routine, causing PHP to freeze."
Link to Original Source

cancel ×

1 comment

Sorry! There are no comments related to the filter you selected.

Cutting to the chase (1)

daemonburrito (1026186) | more than 3 years ago | (#34763924)

Here is Lerdorf's comment on the ticket [php.net] .

This is a well-known, ancient IA-32 or gcc bug (depending on who you ask), and doesn't have much to do with PHP specifically.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>