Description
The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.
Published: 2008-05-07
Score: 9.8 Critical
EPSS: 5.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1789-1 New php5 packages fix several vulnerabilities
Ubuntu USN Ubuntu USN USN-628-1 PHP vulnerabilities
References
Link Providers
http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.html cve-icon cve-icon
http://secunia.com/advisories/30757 cve-icon cve-icon
http://secunia.com/advisories/30828 cve-icon cve-icon
http://secunia.com/advisories/31119 cve-icon cve-icon
http://secunia.com/advisories/31124 cve-icon cve-icon
http://secunia.com/advisories/31200 cve-icon cve-icon
http://secunia.com/advisories/32746 cve-icon cve-icon
http://secunia.com/advisories/35003 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200811-05.xml cve-icon cve-icon
http://securityreason.com/securityalert/3859 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1789 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:125 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:126 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:127 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:128 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:129 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:130 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0505.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0544.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0545.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0546.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0582.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/491683/100/0/threaded cve-icon cve-icon
http://www.sektioneins.de/advisories/SE-2008-02.txt cve-icon cve-icon
http://www.ubuntu.com/usn/usn-628-1 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/42226 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-2108 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10844 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-2108 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.html cve-icon cve-icon
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Fedoraproject Fedora
Php Php
Redhat Enterprise Linux Rhel Application Stack
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T08:49:57.790Z

Reserved: 2008-05-07T00:00:00.000Z

Link: CVE-2008-2108

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-05-07T21:20:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-2108

cve-icon Redhat

Severity : Low

Publid Date: 2008-05-06T00:00:00Z

Links: CVE-2008-2108 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses