Security Advisory SA53676 – WordPress Password Protected Posts Denial of Service Vulnerability – Secunia

Description

Krzysztof Katowicz-Kowalewski has discovered a vulnerability in WordPress, which can be exploited by malicious people to cause DoS (Denial of Service).

The vulnerability is caused due to an error when calculating the hash cycle count within the "crypt_private()" method in /wp-includes/class-phpass.php and can be exploited to exhaust CPU and memory resources by sending HTTP requests with a specially crafted password cookie.

Successful exploitation requires the knowledge of the URL for a password-protected post.

The vulnerability is confirmed in version 3.5.1. Other versions may also be affected.

Solution No official solution is currently available.

Provided and/or discovered by Krzysztof Katowicz-Kowalewski

Original Advisory Krzysztof Katowicz-Kowalewski: https://vndh.net/note:wordpress-351-denial-service

Deep Links Links available to Secunia VIM customers

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Follow this link:
Security Advisory SA53676 - WordPress Password Protected Posts Denial of Service Vulnerability - Secunia

Related Posts

Comments are closed.