From ${URL} : Description Krzysztof Katowicz-Kowalewski has discovered a vulnerability in WordPress, which can be exploited by malicious people to cause DoS (Denial of Service). The vulnerability is caused due to an error when calculating the hash cycle count within the "crypt_private()" method in /wp-includes/class-phpass.php and can be exploited to exhaust CPU and memory resources by sending HTTP requests with a specially crafted password cookie. Successful exploitation requires the knowledge of the URL for a password-protected post. The vulnerability is confirmed in version 3.5.1. Other versions may also be affected. Solution No official solution is currently available. Provided and/or discovered by Krzysztof Katowicz-Kowalewski Original Advisory Krzysztof Katowicz-Kowalewski: https://vndh.net/note:wordpress-351-denial-service @maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
(In reply to Agostino Sarubbo from comment #0) > @maintainer(s): after the bump, in case we need to stabilize the package, > please say explicitly if it is ready for the stabilization or not. wordpress doesn't have any stable keywords and we don't plan to add any
*** Bug 474122 has been marked as a duplicate of this bug. ***
*wordpress-3.5.2 (22 Jun 2013) 22 Jun 2013; Tim Harder <radhermit@gentoo.org> +wordpress-3.5.2.ebuild: Version bump, expand CMS acronym in DESCRIPTION (bug #474030).
Closing as noglsa
CVE-2013-2173 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2173): wp-includes/class-phpass.php in WordPress 3.5.1, when a password-protected post exists, allows remote attackers to cause a denial of service (CPU consumption) via a crafted value of a certain wp-postpass cookie.