Hash collision DoS vulnerability fixed in PHP 5.3.9

PHP 5.3.9 fixes two denial-of-service vulnerabilities and other bug

The PHP development team has released version 5.3.9 of the popular Web development platform in order to address a recently disclosed denial-of-service (DoS) vulnerability, as well as other security issues and bugs.

The DoS vulnerability was disclosed in December 2011 at the Chaos Communication Congress, Europe's largest hacker conference, by security researchers Alexander Klink and Julian Wälde. It affects a number of development platforms including PHP, ASP.NET, Java and Python.

Identified as CVE-2011-4885, the vulnerability allows an attacker to perform what is known as a hash collision attack by forcing the server to process a specially crafted form that contains thousands of values.

This type of HTTP request can trigger a computationally intensive routine, resulting in a denial-of-service condition. For ASP.NET, a request of approximately 100KB in size can consume 100 percent of a CPU core for 90 to 110 seconds.

Sending multiple requests can have an impact on the responsiveness of even a cluster of servers that use multicore processors. The newly released PHP 5.3.9 fixes this issue by adding a max_input_vars directive to the configuration file.

A separate DoS vulnerability that can be exploited to read arbitrary memory locations was also addressed in this release. Identified as CVE-2011-4566, the flaw stems from a bug in the PHP function that parses exif headers. Attackers can exploit the vulnerability by tricking the server into processing JPEG files with specially crafted offset_val values in their Exif headers.

In addition to patching these two vulnerabilities, PHP 5.3.9 contains fixes for a large number of non-security-related bugs, as well as various enhancements.

This stable release comes after the development team made available the fifth release candidate for the upcoming PHP 5.4. "The next and probably last release candidate will be released in 14 days," the developers said at the time.

Earlier this week, a user affiliated with the Anonymous hacktivist movement released working attack code for the hash collision DoS vulnerability in ASP.NET. A similar exploit for the PHP version would not be hard to produce. "All users are strongly encouraged to upgrade to PHP 5.3.9," the platform's developers said.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?