Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-2108

Опубликовано: 07 мая 2008
Источник: debian
EPSS Низкий

Описание

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5fixed5.2.2-1package

Примечания

  • http://web.archive.org/web/20120118120046/http://www.sektioneins.de/advisories/SE-2008-02.txt

EPSS

Процентиль: 89%
0.04738
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 17 лет назад

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.

redhat
около 17 лет назад

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.

CVSS3: 9.8
nvd
около 17 лет назад

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.

CVSS3: 9.8
github
около 3 лет назад

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.

oracle-oval
почти 17 лет назад

ELSA-2008-0544: php security update (MODERATE)

EPSS

Процентиль: 89%
0.04738
Низкий