Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 12 Jun 2013 12:41:54 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>, vnd@...h.net, security@...dpress.org
Subject: Re: CVE request: WordPress 3.5.1 denial of service
 vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/11/2013 07:55 AM, Henri Salo wrote:
> There is denial of service vulnerability (CWE-400) in WordPress 3.5.1. Could you
> assign CVE identifier, thanks.
> 
> Advisory URL: https://vndh.net/note:wordpress-351-denial-service
> PoC: https://vndh.net/snippet:wordpress-351-denial-service:wordpress-py
> Status: Reported to vendor by founder. No reply.
> Reproduced: https://github.com/wpscanteam/wpscan/issues/219
> Note: "Exploitation of this vulnerability is possible only when there is at
> least one password protected post on the blog."
> 
> I have no idea how many uses password protected blog posts and there isn't easy
> way to find out. This might also affect multisite installations. There is patch
> in advisory, which I did not verify.
> 
> ---
> Henri Salo
> 

Please use CVE-2013-2173 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)

iQIcBAEBAgAGBQJRuMDyAAoJEBYNRVNeJnmTyYsP/iQS0yEH6Us8d3TcmPUrebKW
SH6qYMgXAxQJUS+c3haLT92ZbwN+YvWweZSPELOBq+pynG2TrXAnsyy8233mMCNK
b0U7i22Nld3G8/BTZtRQhzfXw85HPJbYFAJ0WDrq7m3hQSoZucqOc+apXv8Y6LST
5t4AAs4f8kE68CGupeNvuuOWTLOBaoo1Yk8lVgpSoPDCDBzJ3eby4VhYv6NAggdn
h9sGyqz0E5nAC+4xMMM3w6OKsbh0vRkFNHU183tOl1Yej5sDwfHHDjbsmmfbFtjQ
4rpwepr8KvCg3NVmIqZz6Chr67ylrfioY6TDR1cao2iKDyBkWb5EWqBo7V0PAz+w
ypKH3ykcxeCxSOvecoMLo6nfPZZ/rnasxvag08z6TJ6nraIoQ7NBzgNjoHEVo2s4
09CLneYlveFrN3N3QdYEx1RZVuNoj+GkvsmvGGl40lxdSIoY8v88Wk1T/2FyrF+s
AfcHla4iqy5mdrcBI3v8WsojoXXCj2TxPmXV0yBqSyFszt38zUaugIayz1lwJ2hz
X0d4MAuHPhcUet0NnJDiejsR/9dIthkCr4VoZ9anbrHZSmXyy3NpZb2aCkOJxMgy
IPk4c0aUPgQm6FS8doe5nl7Mts2FEllURNVg1ZL2fHtGZPz+UGYW8Klaf1Bfl97+
ZHySQr7HqGvEIZHV+j65
=lBRl
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.