PHP Affected by Critical Security Flaw

An extremely serious security flaw has been discovered in PHP, requiring that all affected servers be updated as a matter of urgency.

The flaw allows a remote webserver running an affected version of PHP to be crashed using nothing more than a URL request.

If you are running a 64 bit version of PHP you are unaffected, but if you are running in 32 bit mode, or you are not sure,

Now would be a good time to drop everything and make sure that your server is not vulnerable, by installing the latest version of PHP either from php.net, or from your own webserver vendor. Zend Server has a hotfix available already.

Due to the massive impact of the flaw and the trivial way in which it can be exploited, news of this bug will spread rapidly so speed is of the essence in getting your server patched.

This entry was posted in Website Development and tagged , , , , . Bookmark the permalink.

5 Responses to PHP Affected by Critical Security Flaw

  1. Taurus says:
    Thank you very much for this info. Already opened a Support Ticket with my Host.
  2. adsensjm says:
    Yeah, thanks for that. I also opened a ticket to have my VPS updated.
  3. JamesColin says:
    Well I hope dreamhost will fix this very quickly, I trust them, they are good.
  4. Dogs and things says:
    Thanks for the info.

    Although my server was not affected by this bug I have updated my PHP.
  5. JamesColin says:
    I have not read anything about that on dreamhost..

Leave a Reply

Your email address will not be published. Required fields are marked *

*