CVE-2008-4107: The rand and mt_rand functions in PHP produce weak random numbers

Related Vulnerabilities: CVE-2008-4107   CVE-2008-2107   CVE-2008-2108   CVE-2008-4102  

Debian Bug report logs - #500087
CVE-2008-4107: The rand and mt_rand functions in PHP produce weak random numbers

version graph

Reported by: Stefan Fritsch <sf@sfritsch.de>

Date: Wed, 24 Sep 2008 21:57:02 UTC

Severity: wishlist

Tags: security

Found in version php5/5.2.6-3

Fixed in version 5.6.26+dfsg-1+rm

Done: Debian FTP Masters <ftpmaster@ftp-master.debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Debian Testing Security Team <secure-testing-team@lists.alioth.debian.org>, Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>:
Bug#500087; Package php5. (Wed, 24 Sep 2008 21:57:04 GMT) (full text, mbox, link).


Acknowledgement sent to Stefan Fritsch <sf@sfritsch.de>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Debian Testing Security Team <secure-testing-team@lists.alioth.debian.org>, Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>. (Wed, 24 Sep 2008 21:57:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Stefan Fritsch <sf@sfritsch.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2008-4107: The rand and mt_rand functions in PHP produce weak random numbers
Date: Wed, 24 Sep 2008 23:47:31 +0200
Package: php5
Version: 5.2.6-3
Severity: important
Tags: security


>From CVE-2008-4107:
The (1) rand and (2) mt_rand functions in PHP 5.2.6 do not produce
cryptographically strong random numbers, which allows attackers to
leverage exposures in products that rely on these functions for
security-relevant functionality, as demonstrated by the password-reset
functionality in Joomla! 1.5.x and WordPress before 2.6.2, a different
vulnerability than CVE-2008-2107, CVE-2008-2108, and CVE-2008-4102.


The advisory
http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/
talks about a new suhosin release that fixes this in php and not in the
applications. Maybe this fix could be backported to lenny once it becomes
available?




Information forwarded to debian-bugs-dist@lists.debian.org, Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>:
Bug#500087; Package php5. (Thu, 25 Sep 2008 23:03:04 GMT) (full text, mbox, link).


Acknowledgement sent to "Raphael Geissert" <atomo64@gmail.com>:
Extra info received and forwarded to list. Copy sent to Debian PHP Maintainers <pkg-php-maint@lists.alioth.debian.org>. (Thu, 25 Sep 2008 23:03:04 GMT) (full text, mbox, link).


Message #10 received at 500087@bugs.debian.org (full text, mbox, reply):

From: "Raphael Geissert" <atomo64@gmail.com>
To: "Stefan Fritsch" <sf@sfritsch.de>, 500087@bugs.debian.org
Subject: Re: [php-maint] Bug#500087: CVE-2008-4107: The rand and mt_rand functions in PHP produce weak random numbers
Date: Thu, 25 Sep 2008 18:00:38 -0500
2008/9/24 Stefan Fritsch <sf@sfritsch.de>:
> Package: php5
> Version: 5.2.6-3
> Severity: important
> Tags: security
>
>
> >From CVE-2008-4107:
> The (1) rand and (2) mt_rand functions in PHP 5.2.6 do not produce
> cryptographically strong random numbers, which allows attackers to
> leverage exposures in products that rely on these functions for
> security-relevant functionality, as demonstrated by the password-reset
> functionality in Joomla! 1.5.x and WordPress before 2.6.2, a different
> vulnerability than CVE-2008-2107, CVE-2008-2108, and CVE-2008-4102.

IIRC it is just about calling mt_rand a couple of times every now and
then without using the generated values.

>
>
> The advisory
> http://www.suspekt.org/2008/08/17/mt_srand-and-not-so-random-numbers/
> talks about a new suhosin release that fixes this in php and not in the
> applications. Maybe this fix could be backported to lenny once it becomes
> available?

Blocked by #498621, see #497871

>
>
>


Cheers,
-- 
Atomo64 - Raphael

Please avoid sending me Word, PowerPoint or Excel attachments.
See http://www.gnu.org/philosophy/no-word-attachments.html




Severity set to `wishlist' from `important' Request was from Raphael Geissert <atomo64@gmail.com> to control@bugs.debian.org. (Fri, 05 Dec 2008 03:36:02 GMT) (full text, mbox, link).


Reply sent to Debian FTP Masters <ftpmaster@ftp-master.debian.org>:
You have taken responsibility. (Fri, 13 Jan 2017 13:06:24 GMT) (full text, mbox, link).


Notification sent to Stefan Fritsch <sf@sfritsch.de>:
Bug acknowledged by developer. (Fri, 13 Jan 2017 13:06:24 GMT) (full text, mbox, link).


Message #17 received at 500087-done@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 413713-done@bugs.debian.org,440775-done@bugs.debian.org,447764-done@bugs.debian.org,500087-done@bugs.debian.org,618462-done@bugs.debian.org,628079-done@bugs.debian.org,639268-done@bugs.debian.org,643282-done@bugs.debian.org,697800-done@bugs.debian.org,715264-done@bugs.debian.org,727143-done@bugs.debian.org,730067-done@bugs.debian.org,731055-done@bugs.debian.org,752100-done@bugs.debian.org,759195-done@bugs.debian.org,760454-done@bugs.debian.org,774154-done@bugs.debian.org,774975-done@bugs.debian.org,776564-done@bugs.debian.org,778596-done@bugs.debian.org,782778-done@bugs.debian.org,783246-done@bugs.debian.org,788060-done@bugs.debian.org,789442-done@bugs.debian.org,789702-done@bugs.debian.org,790472-done@bugs.debian.org,790841-done@bugs.debian.org,792239-done@bugs.debian.org,795572-done@bugs.debian.org,797799-done@bugs.debian.org,799136-done@bugs.debian.org,799851-done@bugs.debian.org,800564-done@bugs.debian.org,801831-done@bugs.debian.org,803260-done@bugs.debian.org,803305-done@bugs.debian.org,805591-done@bugs.debian.org,810244-done@bugs.debian.org,811130-done@bugs.debian.org,814907-done@bugs.debian.org,815794-done@bugs.debian.org,815797-done@bugs.debian.org,817917-done@bugs.debian.org,819139-done@bugs.debian.org,827486-done@bugs.debian.org,828498-done@bugs.debian.org,833133-done@bugs.debian.org,833543-done@bugs.debian.org,834579-done@bugs.debian.org,841618-done@bugs.debian.org,845890-done@bugs.debian.org,846244-done@bugs.debian.org,848661-done@bugs.debian.org,849767-done@bugs.debian.org,664595-done@bugs.debian.org,
Cc: php5@packages.debian.org, php5@packages.qa.debian.org
Subject: Bug#841781: Removed package(s) from unstable
Date: Fri, 13 Jan 2017 13:05:30 +0000
Version: 5.6.26+dfsg-1+rm

Dear submitter,

as the package php5 has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/841781

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmaster@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Scott Kitterman (the ftpmaster behind the curtain)



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 11 Feb 2017 07:38:13 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:41:22 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.