7.5
CVSSv2

CVE-2008-2107

Published: 07/05/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The GENERATE_SEED macro in PHP 4.x prior to 4.4.8 and 5.x prior to 5.2.5, when running on 32-bit systems, performs a multiplication using values that can produce a zero seed in rare circumstances, which allows context-dependent malicious users to predict subsequent values of the rand and mt_rand functions and possibly bypass protection mechanisms that rely on an unknown initial seed.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5

php php 5.0.0

php php 5.0.2

php php 5.0.3

php php 5.1.5

php php 5.1.6

php php 5.0.1

php php 5.1.3

php php 5.1.4

php php 5.2.4

php php

php php 5.0.4

php php 5.0.5

php php 5.1.0

php php 5.2.0

php php 5.2.1

php php 5.1.1

php php 5.1.2

php php 5.2.2

php php 5.2.3

Vendor Advisories

It was discovered that PHP did not properly check the length of the string parameter to the fnmatch function An attacker could cause a denial of service in the PHP interpreter if a script passed untrusted input to the fnmatch function (CVE-2007-4782) ...
Several remote vulnerabilities have been discovered in the PHP 5 hypertext preprocessor The Common Vulnerabilities and Exposures project identifies the following problems The following four vulnerabilities have already been fixed in the stable (lenny) version of php5 prior to the release of lenny This update now addresses them for etch (oldstab ...
Debian Bug report logs - #500087 CVE-2008-4107: The rand and mt_rand functions in PHP produce weak random numbers Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: W ...
Debian Bug report logs - #523028 CVE-2008-5814: XSS vulnerability in PHP <= 527 Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: "Michael S Gilbert" <michaelsgilbert@gmailcom> Date: Tue, 7 Apr ...
Debian Bug report logs - #523049 CVE-2009-0754: mbstringfunc_overload setting leakage across vhosts Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: "Michael S Gilbert" <michaelsgilbert@gmailcom> D ...

References

CWE-189http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.htmlhttp://www.sektioneins.de/advisories/SE-2008-02.txthttp://secunia.com/advisories/31200http://www.mandriva.com/security/advisories?name=MDVSA-2008:127https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0505.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:128http://www.redhat.com/support/errata/RHSA-2008-0545.htmlhttp://secunia.com/advisories/30757http://www.mandriva.com/security/advisories?name=MDVSA-2008:130http://www.mandriva.com/security/advisories?name=MDVSA-2008:125http://www.redhat.com/support/errata/RHSA-2008-0546.htmlhttp://secunia.com/advisories/31124http://secunia.com/advisories/30828http://www.mandriva.com/security/advisories?name=MDVSA-2008:129http://www.ubuntu.com/usn/usn-628-1http://secunia.com/advisories/31119http://www.mandriva.com/security/advisories?name=MDVSA-2008:126http://www.redhat.com/support/errata/RHSA-2008-0582.htmlhttp://secunia.com/advisories/30967http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0544.htmlhttp://securityreason.com/securityalert/3859http://secunia.com/advisories/35003http://www.debian.org/security/2009/dsa-1789http://secunia.com/advisories/32746http://security.gentoo.org/glsa/glsa-200811-05.xmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/42284https://exchange.xforce.ibmcloud.com/vulnerabilities/42226https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10644http://www.securityfocus.com/archive/1/491683/100/0/threadedhttps://usn.ubuntu.com/628-1/https://nvd.nist.gov