Vulnerability Description
The Security component in Symfony 2.0.x before 2.0.25, 2.1.x before 2.1.13, 2.2.x before 2.2.9, and 2.3.x before 2.3.6 allows remote attackers to cause a denial of service (CPU consumption) via a long password that triggers an expensive hash computation, as demonstrated by a PBKDF2 computation, a similar issue to CVE-2013-5750.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sensiolabs | Symfony | 2.0.0 |
Related Weaknesses (CWE)
References
- http://symfony.com/blog/security-releases-cve-2013-5958-symfony-2-0-25-2-1-13-2-Vendor Advisory
- http://symfony.com/blog/security-releases-cve-2013-5958-symfony-2-0-25-2-1-13-2-Vendor Advisory
FAQ
What is CVE-2013-5958?
CVE-2013-5958 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The Security component in Symfony 2.0.x before 2.0.25, 2.1.x before 2.1.13, 2.2.x before 2.2.9, and 2.3.x before 2.3.6 allows remote attackers to cause a denial of service (CPU consumption) via a long...
How severe is CVE-2013-5958?
CVE-2013-5958 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-5958?
Check the references section above for vendor advisories and patch information. Affected products include: Sensiolabs Symfony.