| Vulnerability Name: | CVE-2007-0540 (CCN-31784) | ||||||||||||||||
| Assigned: | 2006-01-24 | ||||||||||||||||
| Published: | 2006-01-24 | ||||||||||||||||
| Updated: | 2018-10-16 | ||||||||||||||||
| Summary: | WordPress allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a file with a binary content type, which is downloaded even though it cannot contain usable pingback data. | ||||||||||||||||
| CVSS v3 Severity: | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
| ||||||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.5 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:UR)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:UR)
| ||||||||||||||||
| Vulnerability Type: | CWE-Other | ||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||
| References: | Source: CCN Type: BugTraq Mailing List, Wed Jan 24 2007 - 13:08:51 CST Weaknesses in Pingback Design Source: CCN Type: BugTraq Mailing List, Wed Jan 24 2007 - 13:10:43 CST Multiple Remote Vulnerabilities in Wordpress Source: MITRE Type: CNA CVE-2007-0539 Source: MITRE Type: CNA CVE-2007-0540 Source: SECUNIA Type: UNKNOWN 30013 Source: SREASON Type: UNKNOWN 2191 Source: CCN Type: WordPress Web site WordPress > Download Source: DEBIAN Type: UNKNOWN DSA-1564 Source: DEBIAN Type: DSA-1564 wordpress -- multiple vulnerabilities Source: CCN Type: OSVDB ID: 33005 WordPress Pingback Crafted URI Large File Request DoS Source: CCN Type: OSVDB ID: 33006 WordPress Pingback Crafted URI Binary Content DoS Source: BUGTRAQ Type: UNKNOWN 20070124 Weaknesses in Pingback Design Source: BUGTRAQ Type: UNKNOWN 20070124 Multiple Remote Vulnerabilities in Wordpress Source: CCN Type: BID-22220 WordPress Pingback SourceURI Denial Of Service and Information Disclosure Vulnerability Source: XF Type: UNKNOWN wordpress-pingback-dos(31784) | ||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||
| Oval Definitions | |||||||||||||||||
| |||||||||||||||||
| BACK | |||||||||||||||||