|
Message-ID: <51B8C0F2.60909@redhat.com> Date: Wed, 12 Jun 2013 12:41:54 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Henri Salo <henri@...v.fi>, vnd@...h.net, security@...dpress.org Subject: Re: CVE request: WordPress 3.5.1 denial of service vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 06/11/2013 07:55 AM, Henri Salo wrote: > There is denial of service vulnerability (CWE-400) in WordPress 3.5.1. Could you > assign CVE identifier, thanks. > > Advisory URL: https://vndh.net/note:wordpress-351-denial-service > PoC: https://vndh.net/snippet:wordpress-351-denial-service:wordpress-py > Status: Reported to vendor by founder. No reply. > Reproduced: https://github.com/wpscanteam/wpscan/issues/219 > Note: "Exploitation of this vulnerability is possible only when there is at > least one password protected post on the blog." > > I have no idea how many uses password protected blog posts and there isn't easy > way to find out. This might also affect multisite installations. There is patch > in advisory, which I did not verify. > > --- > Henri Salo > Please use CVE-2013-2173 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJRuMDyAAoJEBYNRVNeJnmTyYsP/iQS0yEH6Us8d3TcmPUrebKW SH6qYMgXAxQJUS+c3haLT92ZbwN+YvWweZSPELOBq+pynG2TrXAnsyy8233mMCNK b0U7i22Nld3G8/BTZtRQhzfXw85HPJbYFAJ0WDrq7m3hQSoZucqOc+apXv8Y6LST 5t4AAs4f8kE68CGupeNvuuOWTLOBaoo1Yk8lVgpSoPDCDBzJ3eby4VhYv6NAggdn h9sGyqz0E5nAC+4xMMM3w6OKsbh0vRkFNHU183tOl1Yej5sDwfHHDjbsmmfbFtjQ 4rpwepr8KvCg3NVmIqZz6Chr67ylrfioY6TDR1cao2iKDyBkWb5EWqBo7V0PAz+w ypKH3ykcxeCxSOvecoMLo6nfPZZ/rnasxvag08z6TJ6nraIoQ7NBzgNjoHEVo2s4 09CLneYlveFrN3N3QdYEx1RZVuNoj+GkvsmvGGl40lxdSIoY8v88Wk1T/2FyrF+s AfcHla4iqy5mdrcBI3v8WsojoXXCj2TxPmXV0yBqSyFszt38zUaugIayz1lwJ2hz X0d4MAuHPhcUet0NnJDiejsR/9dIthkCr4VoZ9anbrHZSmXyy3NpZb2aCkOJxMgy IPk4c0aUPgQm6FS8doe5nl7Mts2FEllURNVg1ZL2fHtGZPz+UGYW8Klaf1Bfl97+ ZHySQr7HqGvEIZHV+j65 =lBRl -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.