CVE-2009-3622

Algorithmic complexity vulnerability in wp-trackback.php in WordPress before 2.8.5 allows remote attackers to cause a denial of service (CPU consumption and server hang) via a long title parameter in conjunction with a charset parameter composed of many comma-separated "UTF-8" substrings, related to the mb_convert_encoding function in PHP.
References
Link Resource
http://codes.zerial.org/php/wp-trackbacks_dos.phps Broken Link
http://marc.info/?l=oss-security&m=125612393329041&w=2 Mailing List Third Party Advisory
http://marc.info/?l=oss-security&m=125614592004825&w=2 Mailing List Third Party Advisory
http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/ Exploit Issue Tracking Vendor Advisory
http://seclists.org/fulldisclosure/2009/Oct/263 Exploit Mailing List Third Party Advisory
http://secunia.com/advisories/37088 Third Party Advisory
http://security-sh3ll.blogspot.com/2009/10/wordpress-resource-exhaustion-denial-of.html Third Party Advisory
http://securitytracker.com/id?1023072 Third Party Advisory VDB Entry
http://wordpress.org/development/2009/10/wordpress-2-8-5-hardening-release/ Vendor Advisory
http://www.osvdb.org/59077 Broken Link
http://www.vupen.com/english/advisories/2009/2986 Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=530056 Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/53884 Third Party Advisory VDB Entry
http://codes.zerial.org/php/wp-trackbacks_dos.phps Broken Link
http://marc.info/?l=oss-security&m=125612393329041&w=2 Mailing List Third Party Advisory
http://marc.info/?l=oss-security&m=125614592004825&w=2 Mailing List Third Party Advisory
http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/ Exploit Issue Tracking Vendor Advisory
http://seclists.org/fulldisclosure/2009/Oct/263 Exploit Mailing List Third Party Advisory
http://secunia.com/advisories/37088 Third Party Advisory
http://security-sh3ll.blogspot.com/2009/10/wordpress-resource-exhaustion-denial-of.html Third Party Advisory
http://securitytracker.com/id?1023072 Third Party Advisory VDB Entry
http://wordpress.org/development/2009/10/wordpress-2-8-5-hardening-release/ Vendor Advisory
http://www.osvdb.org/59077 Broken Link
http://www.vupen.com/english/advisories/2009/2986 Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=530056 Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/53884 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:07

Type Values Removed Values Added
References () http://codes.zerial.org/php/wp-trackbacks_dos.phps - Broken Link () http://codes.zerial.org/php/wp-trackbacks_dos.phps - Broken Link
References () http://marc.info/?l=oss-security&m=125612393329041&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=oss-security&m=125612393329041&w=2 - Mailing List, Third Party Advisory
References () http://marc.info/?l=oss-security&m=125614592004825&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=oss-security&m=125614592004825&w=2 - Mailing List, Third Party Advisory
References () http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/ - Exploit, Issue Tracking, Vendor Advisory () http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/ - Exploit, Issue Tracking, Vendor Advisory
References () http://seclists.org/fulldisclosure/2009/Oct/263 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2009/Oct/263 - Exploit, Mailing List, Third Party Advisory
References () http://secunia.com/advisories/37088 - Third Party Advisory () http://secunia.com/advisories/37088 - Third Party Advisory
References () http://security-sh3ll.blogspot.com/2009/10/wordpress-resource-exhaustion-denial-of.html - Third Party Advisory () http://security-sh3ll.blogspot.com/2009/10/wordpress-resource-exhaustion-denial-of.html - Third Party Advisory
References () http://securitytracker.com/id?1023072 - Third Party Advisory, VDB Entry () http://securitytracker.com/id?1023072 - Third Party Advisory, VDB Entry
References () http://wordpress.org/development/2009/10/wordpress-2-8-5-hardening-release/ - Vendor Advisory () http://wordpress.org/development/2009/10/wordpress-2-8-5-hardening-release/ - Vendor Advisory
References () http://www.osvdb.org/59077 - Broken Link () http://www.osvdb.org/59077 - Broken Link
References () http://www.vupen.com/english/advisories/2009/2986 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/2986 - Patch, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=530056 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=530056 - Issue Tracking
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/53884 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/53884 - Third Party Advisory, VDB Entry

Information

Published : 2009-10-23 18:30

Updated : 2024-11-21 01:07


NVD link : CVE-2009-3622

Mitre link : CVE-2009-3622

CVE.ORG link : CVE-2009-3622


JSON object : View

Products Affected

wordpress

  • wordpress
CWE
CWE-310

Cryptographic Issues