First published: Mon Aug 18 2014(Updated: )
The Incutio XML-RPC (IXR) Library, as used in WordPress before 3.9.2 and Drupal 6.x before 6.33 and 7.x before 7.31, does not limit the number of elements in an XML document, which allows remote attackers to cause a denial of service (CPU consumption) via a large document, a different vulnerability than CVE-2014-5265.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=3.9.1 | |
WordPress | =3.0 | |
WordPress | =3.0.1 | |
WordPress | =3.0.2 | |
WordPress | =3.0.3 | |
WordPress | =3.0.4 | |
WordPress | =3.0.5 | |
WordPress | =3.0.6 | |
WordPress | =3.1 | |
WordPress | =3.1.1 | |
WordPress | =3.1.2 | |
WordPress | =3.1.3 | |
WordPress | =3.1.4 | |
WordPress | =3.2 | |
WordPress | =3.2-beta1 | |
WordPress | =3.2.1 | |
WordPress | =3.3 | |
WordPress | =3.3.1 | |
WordPress | =3.3.2 | |
WordPress | =3.3.3 | |
WordPress | =3.4.0 | |
WordPress | =3.4.1 | |
WordPress | =3.4.2 | |
WordPress | =3.5.0 | |
WordPress | =3.5.1 | |
WordPress | =3.6 | |
WordPress | =3.6.1 | |
WordPress | =3.7 | |
WordPress | =3.7.1 | |
WordPress | =3.8 | |
WordPress | =3.8.1 | |
WordPress | =3.9.0 | |
Drupal | =6.0 | |
Drupal | =6.0-beta1 | |
Drupal | =6.0-beta2 | |
Drupal | =6.0-beta3 | |
Drupal | =6.0-beta4 | |
Drupal | =6.0-dev | |
Drupal | =6.0-rc1 | |
Drupal | =6.0-rc2 | |
Drupal | =6.0-rc3 | |
Drupal | =6.0-rc4 | |
Drupal | =6.1 | |
Drupal | =6.2 | |
Drupal | =6.3 | |
Drupal | =6.4 | |
Drupal | =6.5 | |
Drupal | =6.6 | |
Drupal | =6.7 | |
Drupal | =6.8 | |
Drupal | =6.9 | |
Drupal | =6.10 | |
Drupal | =6.11 | |
Drupal | =6.12 | |
Drupal | =6.13 | |
Drupal | =6.14 | |
Drupal | =6.15 | |
Drupal | =6.16 | |
Drupal | =6.17 | |
Drupal | =6.18 | |
Drupal | =6.19 | |
Drupal | =6.20 | |
Drupal | =6.21 | |
Drupal | =6.22 | |
Drupal | =6.23 | |
Drupal | =6.24 | |
Drupal | =6.25 | |
Drupal | =6.26 | |
Drupal | =6.27 | |
Drupal | =6.28 | |
Drupal | =6.29 | |
Drupal | =6.30 | |
Drupal | =6.31 | |
Drupal | =6.32 | |
Drupal | =7.0 | |
Drupal | =7.0-alpha1 | |
Drupal | =7.0-alpha2 | |
Drupal | =7.0-alpha3 | |
Drupal | =7.0-alpha4 | |
Drupal | =7.0-alpha5 | |
Drupal | =7.0-alpha6 | |
Drupal | =7.0-alpha7 | |
Drupal | =7.0-beta1 | |
Drupal | =7.0-beta2 | |
Drupal | =7.0-beta3 | |
Drupal | =7.0-dev | |
Drupal | =7.0-rc1 | |
Drupal | =7.0-rc2 | |
Drupal | =7.0-rc3 | |
Drupal | =7.0-rc4 | |
Drupal | =7.1 | |
Drupal | =7.2 | |
Drupal | =7.3 | |
Drupal | =7.4 | |
Drupal | =7.5 | |
Drupal | =7.6 | |
Drupal | =7.7 | |
Drupal | =7.8 | |
Drupal | =7.9 | |
Drupal | =7.10 | |
Drupal | =7.11 | |
Drupal | =7.12 | |
Drupal | =7.13 | |
Drupal | =7.14 | |
Drupal | =7.15 | |
Drupal | =7.16 | |
Drupal | =7.17 | |
Drupal | =7.18 | |
Drupal | =7.19 | |
Drupal | =7.20 | |
Drupal | =7.21 | |
Drupal | =7.22 | |
Drupal | =7.23 | |
Drupal | =7.24 | |
Drupal | =7.25 | |
Drupal | =7.26 | |
Drupal | =7.27 | |
Drupal | =7.28 | |
Drupal | =7.29 | |
Drupal | =7.30 | |
Drupal | =7.x-dev | |
Debian | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5266 is classified as a high severity vulnerability due to its potential to cause denial of service through excessive CPU consumption.
To fix CVE-2014-5266, update WordPress to version 3.9.2 or later, and Drupal to version 6.33 or 7.31 or later.
CVE-2014-5266 affects WordPress versions prior to 3.9.2 and Drupal versions prior to 6.33 and 7.31.
CVE-2014-5266 allows remote attackers to conduct denial of service attacks by sending large XML documents.
Implementing input validation to limit the size of incoming XML documents can serve as a temporary workaround for CVE-2014-5266.