Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-2107

Опубликовано: 07 мая 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5

Описание

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.12
devel

not-affected

5.2.6-1ubuntu1
feisty

released

5.2.1-0ubuntu1.6
gutsy

released

5.2.3-1ubuntu6.4
hardy

released

5.2.4-2ubuntu5.3
upstream

released

5.2.5

Показывать по

EPSS

Процентиль: 85%
0.02595
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
около 17 лет назад

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.

nvd
около 17 лет назад

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.

debian
около 17 лет назад

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, ...

github
около 3 лет назад

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.

oracle-oval
почти 17 лет назад

ELSA-2008-0544: php security update (MODERATE)

EPSS

Процентиль: 85%
0.02595
Низкий

7.5 High

CVSS2