Описание
Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | not-affected | 5.3.5-1ubuntu1 |
hardy | not-affected | |
karmic | not-affected | |
lucid | not-affected | |
maverick | not-affected | |
upstream | released | 5.3.4 |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.
Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.
Integer overflow in the mt_rand function in PHP before 5.3.4 might mak ...
Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.
Уязвимость функции mt_rand интерпретатора языка программирования PHP, позволяющая нарушителю прогнозировать возвращаемые значений
EPSS
5 Medium
CVSS2