You are more than invited to read the post I wrote on the SpiderLabs blog about CVE-2014-0050.
The post include analysis of the vulnerability, exploit and recommendations. You can find the post here:
http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html