Advisory for immediate release: This vulnerability exists in the PHP Apache SPI POST parsing code: code PHP signed comparison vulnerability example /* {{{ sapi_apache_read_post */ static int sapi_apache_read_post(char *buffer, uint count_bytes TSRMLS_DC) { uint total_read_bytes=0, read_bytes; request_rec *r = (request_rec *) SG(server_context); void (*handler)(int); /* * This handles the situation where the browser sends a Expect: * 100-continue header * and needs to recieve confirmation from the server on whether * or not it can send * the rest of the request. RFC 2616 * */ if (!SG(read_post_bytes) && !ap_should_client_block(r)) { return total_read_bytes; } handler = signal(SIGPIPE, SIG_IGN); while (total_read_bytes