First published: Wed Oct 21 2009(Updated: )
A denial of service (resource exhaustion) flaw was found in the way WordPress used to handle HTTP headers, contained in the "trackback" message, sent to WordPress. A local, unprivileged user could sent a specially-crafted trackback message to running instance of WordPress, leading to its crash. References: ---------- <a href="http://wordpress.org/development/2009/10/wordpress-2-8-5-hardening-release/">http://wordpress.org/development/2009/10/wordpress-2-8-5-hardening-release/</a> <a href="http://seclists.org/fulldisclosure/2009/Oct/263">http://seclists.org/fulldisclosure/2009/Oct/263</a> PoC: ---- <a href="http://codes.zerial.org/php/wp-trackbacks_dos.phps">http://codes.zerial.org/php/wp-trackbacks_dos.phps</a> CVE was requested here: ----------------------- <a href="http://www.openwall.com/lists/oss-security/2009/10/21/2">http://www.openwall.com/lists/oss-security/2009/10/21/2</a>
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-530056 is categorized as a denial of service vulnerability.
To fix REDHAT-BUG-530056, update to the latest version of WordPress that addresses this vulnerability.
Any installation of WordPress that processes trackback messages is affected by REDHAT-BUG-530056.
REDHAT-BUG-530056 is associated with a resource exhaustion attack leading to denial of service.
Yes, an unprivileged user can exploit REDHAT-BUG-530056 by sending specially-crafted trackback messages.