7.5
CVSSv2

CVE-2008-2108

Published: 07/05/2008 Updated: 15/02/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The GENERATE_SEED macro in PHP 4.x prior to 4.4.8 and 5.x prior to 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.

Vulnerable Product Search on Vulmon Subscribe to Product

php php

fedoraproject fedora 9

fedoraproject fedora 8

canonical ubuntu linux 7.04

canonical ubuntu linux 7.10

canonical ubuntu linux 8.04

canonical ubuntu linux 6.06

debian debian linux 4.0

Vendor Advisories

It was discovered that PHP did not properly check the length of the string parameter to the fnmatch function An attacker could cause a denial of service in the PHP interpreter if a script passed untrusted input to the fnmatch function (CVE-2007-4782) ...
Several remote vulnerabilities have been discovered in the PHP 5 hypertext preprocessor The Common Vulnerabilities and Exposures project identifies the following problems The following four vulnerabilities have already been fixed in the stable (lenny) version of php5 prior to the release of lenny This update now addresses them for etch (oldstab ...
Debian Bug report logs - #500087 CVE-2008-4107: The rand and mt_rand functions in PHP produce weak random numbers Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: W ...
Debian Bug report logs - #523028 CVE-2008-5814: XSS vulnerability in PHP <= 527 Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: "Michael S Gilbert" <michaelsgilbert@gmailcom> Date: Tue, 7 Apr ...
Debian Bug report logs - #523049 CVE-2009-0754: mbstringfunc_overload setting leakage across vhosts Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: "Michael S Gilbert" <michaelsgilbert@gmailcom> D ...

References

CWE-331http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.htmlhttp://www.sektioneins.de/advisories/SE-2008-02.txthttp://www.mandriva.com/security/advisories?name=MDVSA-2008:130http://www.redhat.com/support/errata/RHSA-2008-0582.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:128http://www.mandriva.com/security/advisories?name=MDVSA-2008:125http://secunia.com/advisories/31119http://www.redhat.com/support/errata/RHSA-2008-0505.htmlhttp://secunia.com/advisories/31200https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.htmlhttp://secunia.com/advisories/30757http://www.mandriva.com/security/advisories?name=MDVSA-2008:126http://www.redhat.com/support/errata/RHSA-2008-0546.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0545.htmlhttp://secunia.com/advisories/31124http://www.mandriva.com/security/advisories?name=MDVSA-2008:127http://www.redhat.com/support/errata/RHSA-2008-0544.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:129http://www.ubuntu.com/usn/usn-628-1http://secunia.com/advisories/30828https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.htmlhttp://securityreason.com/securityalert/3859http://secunia.com/advisories/35003http://www.debian.org/security/2009/dsa-1789http://secunia.com/advisories/32746http://security.gentoo.org/glsa/glsa-200811-05.xmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/42226https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10844http://www.securityfocus.com/archive/1/491683/100/0/threadedhttps://usn.ubuntu.com/628-1/https://nvd.nist.gov