Title: PHP on Apache php_default_post_reader POST Request Handling Overflow DoS
Mar 26, 2007
PHP on Apache is prone to an overflow condition. This issue is triggered when a POST request that exceeds post_max_size is sent to the php_default_post_reader directive. This will result in an overflow, which will allow an attacker to cause a denial of service.
Remote / Network Access
Denial of Service,
Loss of Availability
Patch / RCS
Currently, there are no known workarounds or upgrades to correct this issue. However, a patch has been committed to the CVS/GIT repository that addresses this vulnerability. Until it is incorporated into the next release of the software, manually patching an existing installation is the only known available solution. Check the vendor advisory or solution URL in the references section.