logo
DATABASE RESOURCES PRICING ABOUT US

Denial Of Service (DoS)

Description

php is vulnerable to denial of service (DoS). The vulnerability exists as it was found that the hashing routine used by PHP arrays was susceptible to predictable hash collisions. If an HTTP POST request to a PHP application contained many parameters whose names map to the same hash value, a large amount of CPU time would be consumed. This flaw has been mitigated by adding a new configuration directive, max_input_vars, that limits the maximum number of parameters processed per request. By default, max_input_vars is set to 1000.


Affected Software


CPE Name Name Version
php 5.1.6__11.el5
php 5.1.6__7.el5
php 5.1.6__20.el5_2.1
php 5.3.2__6.el6_0.1
php 5.1.6__12.el5
php 5.1.6__20.el5
php 5.3.2__6.el6
php 5.1.6__23.2.el5_3
php 5.1.6__24.el5_4.5
php 5.1.6__15.el5
php 5.1.6__23.el5
php 5.1.6__5.el5
php 5.1.6__11.el5
php 5.1.6__7.el5
php 5.1.6__20.el5_2.1
php 5.3.2__6.el6_0.1
php 5.1.6__12.el5
php 5.1.6__20.el5
php 5.3.2__6.el6
php 5.1.6__23.2.el5_3
php 5.1.6__24.el5_4.5
php 5.1.6__15.el5
php 5.1.6__23.el5
php 5.1.6__5.el5

Related