Vulnerability Details : CVE-2009-3622
Algorithmic complexity vulnerability in wp-trackback.php in WordPress before 2.8.5 allows remote attackers to cause a denial of service (CPU consumption and server hang) via a long title parameter in conjunction with a charset parameter composed of many comma-separated "UTF-8" substrings, related to the mb_convert_encoding function in PHP.
Vulnerability category: Denial of service
Products affected by CVE-2009-3622
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
Threat overview for CVE-2009-3622
Top countries where our scanners detected CVE-2009-3622
Top open port discovered on systems with this issue
80
IPs affected by CVE-2009-3622 2
Find out if you* are
affected by CVE-2009-3622!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2009-3622
4.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-3622
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2009-3622
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-3622
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/53884
WordPress wp-trackback.php denial of service CVE-2009-3622 Vulnerability ReportThird Party Advisory;VDB Entry
-
https://bugzilla.redhat.com/show_bug.cgi?id=530056
530056 – (CVE-2009-3622) CVE-2009-3622 WordPress: Resource exhaustion (DoS)Issue Tracking
-
http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/
Agujero de seguridad muy grave en WordPress | Desvaríos informáticosExploit;Issue Tracking;Vendor Advisory
-
http://codes.zerial.org/php/wp-trackbacks_dos.phps
403 ForbiddenBroken Link
-
http://seclists.org/fulldisclosure/2009/Oct/263
Full Disclosure: [Wordpress] Resource Exhaustion (Denial of Service)Exploit;Mailing List;Third Party Advisory
-
http://www.vupen.com/english/advisories/2009/2986
Site en constructionPatch;Vendor Advisory
-
http://marc.info/?l=oss-security&m=125612393329041&w=2
'[oss-security] CVE request: Wordpress Trackback DoS' - MARCMailing List;Third Party Advisory
-
http://marc.info/?l=oss-security&m=125614592004825&w=2
'Re: [oss-security] CVE request: Wordpress Trackback DoS' - MARCMailing List;Third Party Advisory
-
http://security-sh3ll.blogspot.com/2009/10/wordpress-resource-exhaustion-denial-of.html
Blog not foundThird Party Advisory
-
http://wordpress.org/development/2009/10/wordpress-2-8-5-hardening-release/
WordPress 2.8.5: Hardening Release – WordPress NewsVendor Advisory
-
http://securitytracker.com/id?1023072
GoDaddy Domain Name SearchThird Party Advisory;VDB Entry
Jump to