AMH 4.2 Free Edition fixes PHP remote DoS attack vulnerability

AMH 4.2 Free Edition fixes PHP remote DoS attack vulnerability

Vulnerability Description
CVE-ID: 2015-4024
No.: 69364
Previous versions of PHP have a Multipart/form-data remote attack vulnerability.
The attack conditions are not limited by the website program. As long as a PHP script is currently running, the attacker can attack by sending malicious HTTP requests.
Currently, PHP-5.4.41, PHP-5.5.25, and PHP-5.6.9 versions have been fixed.
Detailed View
https://bugs.php.net/bug.php?id=69364

Impact of Vulnerability Attack
1. Server resources will be heavily occupied (CPU 100%).
2. It will not cause data security issues.

About Vulnerability Solutions

AMH4
AMH4.2 is a single LNMP/php-5.3 environment. All extensions of AMH4 are limited to php5.3 and programs are only compatible with php5.3.
PHP-5.3 PHP official no longer provides updates. Users who are using AMH4.2 please use the following command to upgrade.
sed -i 's/amysql.com/amh.sh/' /root/amh/upgrade
amh upgrade AMH4220150522A1 install
After the update is complete, the default php-5.3.27 of AMH4.2 will be upgraded to php-5.3.27p1 (the old PHP software will be backed up to /usr/local/php-p1).

via:AMH official

<<:  StarryDNS: $7/month/512MB memory/30GB space/500GB traffic/OpenVZ/Japan

>>:  prometeus: €5/month/4Cores/1.8GB RAM/50GB SSD/1.8TB bandwidth/OpenVZ/Italy

Recommend

$12/year/256M memory/15G space/300G traffic/OpenVZ/VPS: SemoWeb

SemoWeb is an American hosting company founded in...

Many domain names registered with Godaddy have been stolen

Found it! Please continue to use the love8.org do...