5
CVSSv2

CVE-2011-4885

Published: 30/12/2011 Updated: 09/01/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 515
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

PHP prior to 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote malicious users to cause a denial of service (CPU consumption) by sending many crafted parameters.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.2.16

php php 5.3.4

php php 5.2.12

php php 5.2.11

php php 5.2.4

php php 5.2.3

php php 5.1.2

php php 5.1.1

php php 5.0.0

php php 5.2.15

php php 5.3.3

php php 5.2.10

php php 5.2.9

php php 5.2.2

php php 5.2.1

php php 5.0.5

php php 5.0.4

php php 5.3.6

php php 5.3.5

php php 5.2.17

php php 5.3.1

php php 5.3.0

php php 5.2.6

php php 5.2.5

php php 5.1.5

php php 5.1.4

php php 5.1.3

php php 5.0.1

php php

php php 5.3.7

php php 5.2.14

php php 5.3.2

php php 5.2.8

php php 5.2.7

php php 5.2.0

php php 5.1.6

php php 5.0.3

php php 5.0.2

Vendor Advisories

Debian Bug report logs - #656308 CVE-2012-0057: XSLT file writing vulnerability Package: src:php5; Maintainer for src:php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Reported by: Yves-Alexis Perez <corsac@debianorg> Date: Wed, 18 Jan 2012 10:36:01 UTC Severity: grave Tags: patch, security, up ...
Synopsis Moderate: php security update Type/Severity Security Advisory: Moderate Topic Updated php packages that fix several security issues are now available forRed Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability Scorin ...
Synopsis Critical: php53 security update Type/Severity Security Advisory: Critical Topic Updated php53 packages that fix one security issue are now available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having criticalsecurity impact A Common Vulnerability Scor ...
Synopsis Moderate: php security update Type/Severity Security Advisory: Moderate Topic Updated php packages that fix several security issues are now available forRed Hat Enterprise Linux 4The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability Scorin ...
Synopsis Moderate: php53 and php security update Type/Severity Security Advisory: Moderate Topic Updated php53 and php packages that fix two security issues are nowavailable for Red Hat Enterprise Linux 5 and 6 respectivelyThe Red Hat Security Response Team has rated this update as having moderatesecurity ...
Synopsis Critical: php security update Type/Severity Security Advisory: Critical Topic Updated php packages that fix one security issue are now available forRed Hat Enterprise Linux 4, 5 and 6The Red Hat Security Response Team has rated this update as having criticalsecurity impact A Common Vulnerability ...
Several vulnerabilities have been discovered in PHP, the web scripting language The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2011-1938 The UNIX socket handling allowed attackers to trigger a buffer overflow via a long path name CVE-2011-2483 The crypt_blowfish function did not properly handle 8-bit ...
Multiple vulnerabilities in PHP ...
USN 1358-1 introduced a regression in PHP ...
It was found that the hashing routine used by PHP arrays was susceptible to predictable hash collisions If an HTTP POST request to a PHP application contained many parameters whose names map to the same hash value, a large amount of CPU time would be consumed This flaw has been mitigated by adding a new configuration directive, max_input_vars, th ...

Exploits

#! /usr/bin/env python """ This script was written by Christian Mehlmauer <FireFart@gmailcom> twittercom/#!/_FireFart_ Sourcecode online at: githubcom/FireFart/HashCollision-DOS-POC Original PHP Payloadgenerator taken from githubcom/koto/blog-kotowicz-net-examples/tree/master/hashcollision wwwocertorg/ ...
# Exploit Title: CVE-2011-4885 PHP Hashtables Denial of Service Exploit # Date: 1/1/12 # Author: infodox # Software Link: phpnet # Version: 53* # Tested on: Linux # CVE : CVE-2011-4885 Exploit Download -- infodoxcocc/Downloads/phpdostxt <?php /* PHP 53* Hash Colission DoS Exploit by infodox Original version by itz me ...
#!/usr/bin/php -q -d short_open_tag=on <? echo "MyBulletinBoard (MyBB) <= 115 'CLIENT-IP' SQL injection / create new admin exploit\n"; echo "by rgod rgod@autisticiorg\n"; echo "site: retrogodaltervistaorg\n"; echo "dork, version specific: \"Powered By MyBB\" \"2006 MyBB Group\"\n\n"; /* works regardless of phpini settings */ if ( ...
PHP 53x hash collision denial of service proof of concept exploit written in Python It generates the payload on the fly and sends it to the server ...
PHP 53x hash collision denial of service proof of concept exploit ...

References

CWE-20http://www.nruns.com/_downloads/advisory28122011.pdfhttp://www.kb.cert.org/vuls/id/903934http://svn.php.net/viewvc?view=revision&revision=321003http://svn.php.net/viewvc?view=revision&revision=321040http://www.ocert.org/advisories/ocert-2011-003.htmlhttp://www.redhat.com/support/errata/RHSA-2012-0019.htmlhttps://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.pyhttp://www.securityfocus.com/bid/51193http://www.exploit-db.com/exploits/18296http://www.exploit-db.com/exploits/18305http://www.debian.org/security/2012/dsa-2399http://marc.info/?l=bugtraq&m=132871655717248&w=2http://support.apple.com/kb/HT5281http://lists.apple.com/archives/security-announce/2012/May/msg00001.htmlhttp://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.htmlhttp://secunia.com/advisories/48668http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.htmlhttp://rhn.redhat.com/errata/RHSA-2012-0071.htmlhttp://secunia.com/advisories/47404http://www.mandriva.com/security/advisories?name=MDVSA-2011:197http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.htmlhttp://www.securitytracker.com/id?1026473http://www.mandriva.com/security/advisories?name=MDVSA-2013:150http://marc.info/?l=bugtraq&m=133469208622507&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/72021http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.htmlhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656308https://nvd.nist.govhttps://usn.ubuntu.com/1358-1/https://www.exploit-db.com/exploits/18305/https://www.kb.cert.org/vuls/id/903934