Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-0755

Опубликовано: 02 фев. 2011
Источник: debian

Описание

Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5fixed5.3.5-1package

Примечания

  • Only exploitable with malicious script

Связанные уязвимости

redhat
больше 16 лет назад

Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.

nvd
больше 14 лет назад

Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.

github
около 3 лет назад

Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.

CVSS3: 5.3
fstec
больше 14 лет назад

Уязвимость функции mt_rand интерпретатора языка программирования PHP, позволяющая нарушителю прогнозировать возвращаемые значений