Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-0632

Опубликовано: 10 фев. 2006
Источник: debian
EPSS Низкий

Описание

The gen_rand_string function in phpBB 2.0.19 uses insufficiently random data (small value space) to create the activation key ("validation ID") that is sent by e-mail when establishing a password, which makes it easier for remote attackers to obtain the key and modify passwords for existing accounts or create new accounts.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
phpbb2fixed2.0.20package
phpbb2no-dsasargepackage

Примечания

  • According to maintainers phpbb2 doesn't have useful countermeasures against

  • brute-force password guessing and as password seeding is based on milliseconds

  • NTP-timed attacks may even be in the area of a couple thousands attempts

  • instead of a million

  • Fixed in 2.0.20

EPSS

Процентиль: 76%
0.0098
Низкий

Связанные уязвимости

ubuntu
почти 20 лет назад

The gen_rand_string function in phpBB 2.0.19 uses insufficiently random data (small value space) to create the activation key ("validation ID") that is sent by e-mail when establishing a password, which makes it easier for remote attackers to obtain the key and modify passwords for existing accounts or create new accounts.

nvd
почти 20 лет назад

The gen_rand_string function in phpBB 2.0.19 uses insufficiently random data (small value space) to create the activation key ("validation ID") that is sent by e-mail when establishing a password, which makes it easier for remote attackers to obtain the key and modify passwords for existing accounts or create new accounts.

github
почти 4 года назад

The gen_rand_string function in phpBB 2.0.19 uses insufficiently random data (small value space) to create the activation key ("validation ID") that is sent by e-mail when establishing a password, which makes it easier for remote attackers to obtain the key and modify passwords for existing accounts or create new accounts.

EPSS

Процентиль: 76%
0.0098
Низкий