WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 might allow remote attackers to obtain access to an account idle since 2008 by leveraging an improper PHP dynamic type comparison for an MD5 hash.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://www.debian.org/security/2014/dsa-3085 | vendor advisory |
http://openwall.com/lists/oss-security/2014/11/25/12 | mailing list |
http://advisories.mageia.org/MGASA-2014-0493.html | |
http://www.securitytracker.com/id/1031243 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:233 | vendor advisory |
https://wordpress.org/news/2014/11/wordpress-4-0-1/ | patch vendor advisory |