CVE-2009-3622

N/A Unknown
Published: October 23, 2009 Modified: April 23, 2026
View on NVD

Description

Algorithmic complexity vulnerability in wp-trackback.php in WordPress before 2.8.5 allows remote attackers to cause a denial of service (CPU consumption and server hang) via a long title parameter in conjunction with a charset parameter composed of many comma-separated "UTF-8" substrings, related to the mb_convert_encoding function in PHP.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://codes.zerial.org/php/wp-trackbacks_dos.phps
Source: secalert@redhat.com
Broken Link
http://marc.info/?l=oss-security&m=125612393329041&w=2
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://marc.info/?l=oss-security&m=125614592004825&w=2
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/
Source: secalert@redhat.com
Exploit Issue Tracking Vendor Advisory
http://seclists.org/fulldisclosure/2009/Oct/263
Source: secalert@redhat.com
Exploit Mailing List Third Party Advisory
http://secunia.com/advisories/37088
Source: secalert@redhat.com
Third Party Advisory
http://securitytracker.com/id?1023072
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.osvdb.org/59077
Source: secalert@redhat.com
Broken Link
http://www.vupen.com/english/advisories/2009/2986
Source: secalert@redhat.com
Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=530056
Source: secalert@redhat.com
Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/53884
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://codes.zerial.org/php/wp-trackbacks_dos.phps
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://marc.info/?l=oss-security&m=125612393329041&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://marc.info/?l=oss-security&m=125614592004825&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking Vendor Advisory
http://seclists.org/fulldisclosure/2009/Oct/263
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Mailing List Third Party Advisory
http://secunia.com/advisories/37088
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security-sh3ll.blogspot.com/2009/10/wordpress-resource-exhaustion-denial-of.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1023072
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://wordpress.org/development/2009/10/wordpress-2-8-5-hardening-release/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/59077
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2009/2986
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=530056
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/53884
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

26 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
8.3%
92th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

wordpress