First published: Tue Nov 25 2014(Updated: )
wp-includes/class-phpass.php in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to cause a denial of service (CPU consumption) via a long password that is improperly handled during hashing, a similar issue to CVE-2014-9016.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=3.7.4 | |
WordPress | =3.8 | |
WordPress | =3.8.1 | |
WordPress | =3.8.2 | |
WordPress | =3.8.3 | |
WordPress | =3.8.4 | |
WordPress | =3.9 | |
WordPress | =3.9.1 | |
WordPress | =3.9.2 | |
WordPress | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9034 has a medium severity level as it leads to a denial of service condition due to increased CPU consumption.
To fix CVE-2014-9034, you should upgrade your WordPress installation to version 3.7.5, 3.8.5, 3.9.3, or 4.0.1 or later.
CVE-2014-9034 affects WordPress versions prior to 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1.
CVE-2014-9034 allows remote attackers to exploit the vulnerability through crafted long passwords leading to denial of service.
A potential workaround for CVE-2014-9034 is to implement input validation to limit password length until an update can be applied.