CVE-2008-2108

9.8 CRITICAL
Published: May 07, 2008 Modified: April 23, 2026
View on NVD

Description

The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/30757
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/30828
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/31119
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/31124
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/31200
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/32746
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/35003
Source: cve@mitre.org
Broken Link
http://security.gentoo.org/glsa/glsa-200811-05.xml
Source: cve@mitre.org
Third Party Advisory
http://securityreason.com/securityalert/3859
Source: cve@mitre.org
Mailing List
http://www.debian.org/security/2009/dsa-1789
Source: cve@mitre.org
Mailing List
http://www.securityfocus.com/archive/1/491683/100/0/threaded
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.sektioneins.de/advisories/SE-2008-02.txt
Source: cve@mitre.org
Broken Link Exploit
http://www.ubuntu.com/usn/usn-628-1
Source: cve@mitre.org
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/42226
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit
http://secunia.com/advisories/30757
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/30828
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/31119
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/31124
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/31200
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/32746
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/35003
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200811-05.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securityreason.com/securityalert/3859
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.debian.org/security/2009/dsa-1789
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.mandriva.com/security/advisories?name=MDVSA-2008:125
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2008:126
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2008:127
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2008:128
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2008:129
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2008:130
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0505.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0544.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0545.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0546.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0582.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/491683/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.sektioneins.de/advisories/SE-2008-02.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit
http://www.ubuntu.com/usn/usn-628-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/42226
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00773.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00779.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List

58 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
5.6%
90th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

php canonical debian fedoraproject