Description
The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1789-1 | New php5 packages fix several vulnerabilities |
EUVD |
EUVD-2008-2104 | The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent attackers to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed. |
Ubuntu USN |
USN-628-1 | PHP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T08:49:57.969Z
Reserved: 2008-05-07T00:00:00.000Z
Link: CVE-2008-2107
No data.
Status : Deferred
Published: 2008-05-07T21:20:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-2107
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN