Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 473010 (CVE-2013-2173) - <www-apps/wordpress-3.5.2 : Password Protected Posts Denial of Service Vulnerability (CVE-2013-2173)
Summary: <www-apps/wordpress-3.5.2 : Password Protected Posts Denial of Service Vulner...
Status: RESOLVED FIXED
Alias: CVE-2013-2173
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/53676/
Whiteboard: ~3 [noglsa]
Keywords:
: 474122 (view as bug list)
Depends on:
Blocks:
 
Reported: 2013-06-11 18:22 UTC by Agostino Sarubbo
Modified: 2013-08-27 16:32 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-06-11 18:22:45 UTC
From ${URL} :

Description
Krzysztof Katowicz-Kowalewski has discovered a vulnerability in WordPress, which can be exploited by malicious people to cause DoS (Denial of 
Service).

The vulnerability is caused due to an error when calculating the hash cycle count within the "crypt_private()" method in 
/wp-includes/class-phpass.php and can be exploited to exhaust CPU and memory resources by sending HTTP requests with a specially crafted password 
cookie.

Successful exploitation requires the knowledge of the URL for a password-protected post.

The vulnerability is confirmed in version 3.5.1. Other versions may also be affected.


Solution
No official solution is currently available.

Provided and/or discovered by
Krzysztof Katowicz-Kowalewski

Original Advisory
Krzysztof Katowicz-Kowalewski:
https://vndh.net/note:wordpress-351-denial-service


@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 Theo Chatzimichos (RETIRED) archtester gentoo-dev Security 2013-06-11 19:30:47 UTC
(In reply to Agostino Sarubbo from comment #0)
> @maintainer(s): after the bump, in case we need to stabilize the package,
> please say explicitly if it is ready for the stabilization or not.

wordpress doesn't have any stable keywords and we don't plan to add any
Comment 2 Jeroen Roovers (RETIRED) gentoo-dev 2013-06-22 13:42:46 UTC
*** Bug 474122 has been marked as a duplicate of this bug. ***
Comment 3 Jeroen Roovers (RETIRED) gentoo-dev 2013-06-22 13:43:09 UTC
*wordpress-3.5.2 (22 Jun 2013)

  22 Jun 2013; Tim Harder <radhermit@gentoo.org> +wordpress-3.5.2.ebuild:
  Version bump, expand CMS acronym in DESCRIPTION (bug #474030).
Comment 4 Agostino Sarubbo gentoo-dev 2013-06-22 20:06:09 UTC
Closing as noglsa
Comment 5 GLSAMaker/CVETool Bot gentoo-dev 2013-08-27 16:32:55 UTC
CVE-2013-2173 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2173):
  wp-includes/class-phpass.php in WordPress 3.5.1, when a password-protected
  post exists, allows remote attackers to cause a denial of service (CPU
  consumption) via a crafted value of a certain wp-postpass cookie.