Description
WordPress is prone to a vulnerability which can be exploited by malicious people to cause a Denial of Service. The vulnerability is caused due to the 'wp-trackback.php' script letting users pass multiple source character encodings to the "mb_convert_encoding()" function, which can be used to cause a high CPU load, potentially resulting in a DoS, thus denying service to legitimate users. WordPress versions prior to 2.8.5 are vulnerable.
Remediation
Update to WordPress version 2.8.5 or latest
References
http://rooibo.wordpress.com/2009/10/17/agujero-de-seguridad-en-wordpress/
http://wordpress.org/news/2009/10/wordpress-2-8-5-hardening-release/
Related Vulnerabilities
PHP Other Vulnerability (CVE-2007-1412)
WordPress Plugin WP-Download 'dl_id' Parameter SQL Injection (1.2)
CKEditor Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2023-31541)
MySQL CVE-2021-2213 Vulnerability (CVE-2021-2213)
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-15099)