ID: 18363 Updated by: [EMAIL PROTECTED] Reported By: [EMAIL PROTECTED] -Status: Feedback +Status: No Feedback Bug Type: Reproducible crash Operating System: windows PHP Version: 4.2.1 New Comment:
No feedback was provided for this bug for over 2 weeks, so it is being suspended automatically. If you are able to provide the information that was originally requested, please do so and change the status of the bug back to "Open". Previous Comments: ------------------------------------------------------------------------ [2002-10-01 18:09:49] [EMAIL PROTECTED] Please try using this CVS snapshot: http://snaps.php.net/php4-latest.tar.gz For Windows: http://snaps.php.net/win32/php4-win32-latest.zip I've tried opening various exe and com files and I am unable to replicate the crash you've reported. Please try the latest release and see if the problem still occurs. ------------------------------------------------------------------------ [2002-07-23 00:59:02] [EMAIL PROTECTED] When reading with the function fread I have found an error when read hexadecimal "1A", not, but I believe that they must more of the sort have. ------------------------------------------------------------------------ [2002-07-17 02:52:42] [EMAIL PROTECTED] for example:(abc.exe is execution file) $fp=fopen("abc.exe","rb"); $exe_get=fread($fp,filesize("abc.exe")); ------------------------------------------------------------------------ [2002-07-17 02:18:43] [EMAIL PROTECTED] oops...misunderstood (!) this. Can you please show us a SHORT example script which causes this crash? ------------------------------------------------------------------------ [2002-07-17 02:11:09] [EMAIL PROTECTED] i try fread function(binary file) to read execution file may crash php(apache) because exectuion file header is 0x00(????), that is the file header is memory protection area so win2000 kernal may send signal fail ---------------------------------------------------- fread can detection execution file in previous processed? that is do noting for execution file format... ------------------------------------------------------------------------ The remainder of the comments for this report are too long. To view the rest of the comments, please view the bug report online at http://bugs.php.net/18363 -- Edit this bug report at http://bugs.php.net/?id=18363&edit=1