CVE-2009-3622
Published: 23 October 2009
Algorithmic complexity vulnerability in wp-trackback.php in WordPress before 2.8.5 allows remote attackers to cause a denial of service (CPU consumption and server hang) via a long title parameter in conjunction with a charset parameter composed of many comma-separated "UTF-8" substrings, related to the mb_convert_encoding function in PHP.
Notes
Author | Note |
---|---|
ari-tczew | Exploit: http://codes.zerial.org/php/wp-trackbacks_dos.phps |
jdstrand | fixed in 2.5.1-11+lenny3 |
Priority
Status
Package | Release | Status |
---|---|---|
wordpress Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
hardy |
Ignored
(end of life)
|
|
intrepid |
Ignored
(end of life, was needed)
|
|
jaunty |
Ignored
(end of life)
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Not vulnerable
(2.8.6-1ubuntu1)
|
|
maverick |
Not vulnerable
(2.8.6-1ubuntu1)
|
|
natty |
Not vulnerable
(2.8.6-1ubuntu1)
|
|
oneiric |
Not vulnerable
(2.8.6-1ubuntu1)
|
|
upstream |
Released
(2.8.5)
|