Vulnerability Description
lib/exec/fetch.php in DokuWiki before 2006-03-09e allows remote attackers to cause a denial of service (CPU consumption) via large w and h parameters, when resizing an image.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Andreas Gohr | Dokuwiki | release_2006-03-05 |
References
- http://bugs.splitbrain.org/?do=details&id=924ExploitPatch
- http://secunia.com/advisories/22192PatchVendor Advisory
- http://secunia.com/advisories/22199PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200609-20.xmlPatch
- http://www.vupen.com/english/advisories/2006/3851
- http://bugs.splitbrain.org/?do=details&id=924ExploitPatch
- http://secunia.com/advisories/22192PatchVendor Advisory
- http://secunia.com/advisories/22199PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200609-20.xmlPatch
- http://www.vupen.com/english/advisories/2006/3851
FAQ
What is CVE-2006-5098?
CVE-2006-5098 is a vulnerability with a CVSS score of 5.0 (MEDIUM). lib/exec/fetch.php in DokuWiki before 2006-03-09e allows remote attackers to cause a denial of service (CPU consumption) via large w and h parameters, when resizing an image.
How severe is CVE-2006-5098?
CVE-2006-5098 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5098?
Check the references section above for vendor advisories and patch information. Affected products include: Andreas Gohr Dokuwiki.