vendor:
PHP
by:
infodox
7.5
CVSS
HIGH
Denial of Service
693
CWE
Product Name: PHP
Affected Version From: 5.3.*
Affected Version To: 5.3.*
Patch Exists: NO
Related CWE: CVE-2011-4885
CPE: a:php:php:5.3
Metasploit:
https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-1358-1/, https://www.rapid7.com/db/vulnerabilities/php-cve-2012-0830/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2012-0830/, https://www.rapid7.com/db/vulnerabilities/apple-osx-loginwindow-cve-2012-0830/, https://www.rapid7.com/db/vulnerabilities/apple-osx-php-cve-2012-0830/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2012-41/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-0093/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-0092/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2012-0830/, https://www.rapid7.com/db/vulnerabilities/debian-DSA-2403/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2012-0830/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2012-0093/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-3fd040be-4f0b-11e1-9e32-0025900931f8/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2012-0830/, https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2012-0830/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2012-0830/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2012-0830/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2012-0092/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2011-4885/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2011-4885/, https://www.rapid7.com/db/?q=CVE-2011-4885&type=&page=2, https://www.rapid7.com/db/?q=CVE-2011-4885&type=&page=2
Platforms Tested: Linux
2011
CVE-2011-4885 PHP Hashtables Denial of Service
This exploit targets a vulnerability in PHP version 5.3.* which allows an attacker to perform a denial of service attack. The exploit utilizes hash collisions to overload the system and cause it to crash.
Mitigation:
Upgrade to a patched version of PHP or implement proper input validation to prevent hash collisions.