First published: Fri Dec 30 2011(Updated: )
PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=5.3.8 | |
PHP | =5.2.9 | |
PHP | =5.1.5 | |
PHP | =5.3.6 | |
PHP | =5.1.2 | |
PHP | =5.3.1 | |
PHP | =5.1.1 | |
PHP | =5.2.14 | |
PHP | =5.0.0-beta1 | |
PHP | =5.1.6 | |
PHP | =5.2.16 | |
PHP | =5.2.7 | |
PHP | =5.2.2 | |
PHP | =5.0.5 | |
PHP | =5.0.1 | |
PHP | =5.1.4 | |
PHP | =5.2.5 | |
PHP | =5.0.4 | |
PHP | =5.2.12 | |
PHP | =5.2.11 | |
PHP | =5.2.6 | |
PHP | =5.2.17 | |
PHP | =5.3.0 | |
PHP | =5.0.0-rc2 | |
PHP | =5.2.3 | |
PHP | =5.3.3 | |
PHP | =5.0.3 | |
PHP | =5.3.7 | |
PHP | =5.0.0-rc3 | |
PHP | =5.2.0 | |
PHP | =5.2.4 | |
PHP | =5.0.0-beta3 | |
PHP | =5.3.2 | |
PHP | =5.3.4 | |
PHP | =5.1.3 | |
PHP | =5.2.10 | |
PHP | =5.0.0-rc1 | |
PHP | =5.0.2 | |
PHP | =5.2.15 | |
PHP | =5.3.5 | |
PHP | =5.2.1 | |
PHP | =5.0.0-beta4 | |
PHP | =5.0.0 | |
PHP | =5.0.0-beta2 | |
PHP | =5.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4885 is classified as a high severity vulnerability due to its potential to cause denial of service by consuming significant CPU resources.
To fix CVE-2011-4885, upgrade PHP to version 5.3.9 or later.
CVE-2011-4885 can enable remote denial of service attacks through predictable hash collision vulnerabilities.
CVE-2011-4885 affects PHP versions prior to 5.3.9, including versions 5.2.9 and earlier.
To identify if your server is vulnerable to CVE-2011-4885, check the PHP version running on your server and compare it to the affected versions.