Image Resize Filter third party module versions 6.x and 7.x suffer from a denial of service vulnerability.
a3976b1b6db0d07dc86cc6c06dd41bc4e70f7e94e9008ceac2f4e38ff6b81e1d
View online: https://drupal.org/node/2194655
* Advisory ID: DRUPAL-SA-CONTRIB-2014-017
* Project: Image Resize Filter [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2014-February-12
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Denial of Service (DOS)
-------- DESCRIPTION
---------------------------------------------------------
This module enables you to resize images based on the HTML contents of a
post. Images with specified height and width properties that differ from the
original image result in a resized image being created.
The module doesn't limit the number of resized images per post or user, which
could allow a user to post a large number of images that need to be resized
within a single piece of content. This could cause the server to become
overwhelmed by requests to resize images.
This vulnerability is mitigated by the fact that an attacker must have a role
that allows them to post content that utilizes the image resize filter.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Image Resize Filter 6.x-1.x versions prior to 6.x-1.14.
* Image Resize Filter 7.x-1.x versions prior to 7.x-1.14.
Drupal core is not affected. If you do not use the contributed Image Resize
Filter [4] module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Image Resize Filter module for Drupal 6.x, upgrade to
Image
Resize Filter 6.x-1.14 [5]
* If you use the Image Resize Filter module for Drupal 7.x, upgrade to
Image
Resize Filter 7.x-1.14 [6]
Also see the Image Resize Filter [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Dave Hansen-Lange [8]
-------- FIXED BY
------------------------------------------------------------
* Dave Hansen-Lange [9]
* Nate Haug [10] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [11] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]
[1] http://drupal.org/project/image_resize_filter
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/image_resize_filter
[5] https://drupal.org/node/2194063
[6] https://drupal.org/node/2194065
[7] http://drupal.org/project/image_resize_filter
[8] https://drupal.org/user/18981
[9] https://drupal.org/user/18981
[10] https://drupal.org/user/35821
[11] http://drupal.org/user/36762
[12] http://drupal.org/contact
[13] http://drupal.org/security-team
[14] http://drupal.org/writing-secure-code
[15] http://drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity