The password hashing API in Drupal 7.x before 7.34 and the Secure Password Hashes (aka phpass) module 6.x-2.x before 6.x-2.1 for Drupal allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted request.
Link | Tags |
---|---|
https://www.drupal.org/node/2378375 | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2014/11/20/3 | third party advisory mailing list |
https://www.drupal.org/SA-CORE-2014-006 | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/11/20/21 | third party advisory mailing list |
http://secunia.com/advisories/59164 | third party advisory |
https://www.drupal.org/node/2378367 | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2014/11/21/1 | third party advisory mailing list |
http://secunia.com/advisories/59814 | third party advisory |
http://www.debian.org/security/2014/dsa-3075 | third party advisory vendor advisory |