First published: Wed Aug 28 2013(Updated: )
The Login Security module 6.x-1.x before 6.x-1.3 and 7.x-1.x before 7.x-1.3 for Drupal, when using the login delay option, allows remote attackers to cause a denial of service (CPU consumption) via a large number of failed login attempts.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Login Security Project Login Security | =6.x-1.0 | |
Login Security Project Login Security | =6.x-1.0-beta1 | |
Login Security Project Login Security | =6.x-1.0-rc1 | |
Login Security Project Login Security | =6.x-1.1 | |
Login Security Project Login Security | =6.x-1.2 | |
Login Security Project Login Security | =6.x-1.3 | |
Login Security Project Login Security | =6.x-1.x-dev | |
Login Security Project Login Security | =7.x-1.0 | |
Login Security Project Login Security | =7.x-1.1 | |
Login Security Project Login Security | =7.x-1.2 | |
Login Security Project Login Security | =7.x-1.x-dev | |
Drupal Drupal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.