navigation bar left navigation bar right

Secunia CSI7
navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Update to latest

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Programs

Relating to this vendor:
Apache Software Foundation
And, this specific program:
Apache HTTP Server 2.2.x

This thread has been marked as locked.
JoshuaXiong Update to latest
Member 7th Jan, 2011 07:22
Ranking: 0
Posts: 1
User Since: 3rd Oct, 2010
System Score: N/A
Location: N/A
I am using wamp and secunia has detected that I update to the latest. How ever when I download the only .exe file... my server weren't able to use .php anymore.. Can someone help me solve this.

mogs RE: Update to latest
Expert Contributor 7th Jan, 2011 09:00
Score: 2265
Posts: 6,268
User Since: 22nd Apr 2009
System Score: 100%
Location: UK
Last edited on 7th Jan, 2011 09:04
Hello.
Just found the following article...haps it goes some way towards explaining ?

PHP apps plagued by Mark of the Beast bug

Death by decimal places
By Dan Goodin in San Francisco • Get more from this author
Posted in Security, 4th January 2011 19:08 GMT
Web developers are in a lather following the discovery of a bug in the PHP programming language that causes computers to freeze when they process certain numerical values with large numbers of decimal places.

The error in the way floating-point and double-precision numbers are handled sends 32-bit systems running Linux, Windows, and FreeBSD into an infinite loop that consumes 100 percent of their CPU's resources. Developers are still investigating, but they say the bug appears to affect versions 5.2 and 5.3 of PHP. They say it could be trivially exploited on many websites to cause them to crash by adding long numbers to certain URLs.

“Since PHP drives everything from WordPress to Wikipedia, there could be a ton of vulnerable sites,” H D Moore, CSO of Rapid7 and chief architect of the Metasploit project, told The Reg. “The use case for this would be to quickly kill any web server hosting a vulnerable PHP instance and application.”
http://www.theregister.co.uk/2011/01/04/weird_php_...

--
Was this reply relevant?
+1
-0
This user no longer exists RE: Update to latest
Member 7th Jan, 2011 11:07
Hi,

Unfortunately, Secunia doesn't provide support for third-party applications such as Apache or PHP.
If you want support for either of these products (That are unrelated to Secunia services), I recommend you ask the Apache mailing list (http://www.apache.org/foundation/mailinglists.html), or possibly the PHP forum, found here: http://www.php-forum.com/

So the following is my personal advice for you, and should be taken as such only.

Are you able to access http://127.0.0.1/? And can PHP pages on the local system?
If so, have a look at your firewall rules.

Can the server serve up HTML but not PHP?
Try looking here and see if anything deviates from your install: http://www.thesitewizard.com/php/install-php-5-apa...

Is the version of the Apache PHP module you have installed compatible with your Apache release? The module in question is 'mod_php' (at least on UNIX-based systems).

If you can provide some more detail about what exactly isn't working we might be able to close in on the problem.

Hope this helps. :)

Was this reply relevant?
+0
-0

This thread has been marked as locked.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+