First published: Tue Nov 25 2014(Updated: )
WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 might allow remote attackers to obtain access to an account idle since 2008 by leveraging an improper PHP dynamic type comparison for an MD5 hash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mageia | =3 | |
Mageia | =4 | |
WordPress | <=3.7.4 | |
WordPress | =3.8 | |
WordPress | =3.8.1 | |
WordPress | =3.8.2 | |
WordPress | =3.8.3 | |
WordPress | =3.8.4 | |
WordPress | =3.9 | |
WordPress | =3.9.1 | |
WordPress | =3.9.2 | |
WordPress | =4.0 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9037 is classified as a moderate severity vulnerability due to its potential for unauthorized account access.
Fixing CVE-2014-9037 involves upgrading to WordPress versions 3.7.5, 3.8.5, 3.9.3, or 4.0.1 or later.
CVE-2014-9037 affects WordPress versions below 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1.
Attackers exploiting CVE-2014-9037 may gain access to accounts that have been idle since 2008.
Yes, Mageia versions 3 and 4 are affected by CVE-2014-9037.