CVE-2006-0632
CVSS6.4
发布时间 :2006-02-10 06:02:00
修订时间 :2011-03-07 21:30:28
NMCO    

[原文]The gen_rand_string function in phpBB 2.0.19 uses insufficiently random data (small value space) to create the activation key ("validation ID") that is sent by e-mail when establishing a password, which makes it easier for remote attackers to obtain the key and modify passwords for existing accounts or create new accounts.


[CNNVD]phpBB gen_rand_string功能电子邮件激活密钥安全信息泄露漏洞(CNNVD-200602-127)

        phpBB 2.0.19中的gen_rand_string功能使用随机数据(小值空间)创建将在建立密码时通过电子邮件发送的激活密钥("验证 ID"),这使得远程攻击者更容易获取密钥并修改现有帐户的密码或创建新帐户。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:phpbb_group:phpbb:2.0.0
cpe:/a:phpbb_group:phpbb:2.0_beta1
cpe:/a:phpbb_group:phpbb:2.0.6c
cpe:/a:phpbb_group:phpbb:2.0.17
cpe:/a:phpbb_group:phpbb:2.0.6
cpe:/a:phpbb_group:phpbb:2.0.9
cpe:/a:phpbb_group:phpbb:2.0.12
cpe:/a:phpbb_group:phpbb:2.0.1
cpe:/a:phpbb_group:phpbb:2.0.6d
cpe:/a:phpbb_group:phpbb:2.0_rc4
cpe:/a:phpbb_group:phpbb:2.0.7a
cpe:/a:phpbb_group:phpbb:2.0.3
cpe:/a:phpbb_group:phpbb:2.0.5
cpe:/a:phpbb_group:phpbb:2.0.16
cpe:/a:phpbb_group:phpbb:2.0.4
cpe:/a:phpbb_group:phpbb:2.0.14
cpe:/a:phpbb_group:phpbb:2.0.10
cpe:/a:phpbb_group:phpbb:2.0_rc3
cpe:/a:phpbb_group:phpbb:2.0.7
cpe:/a:phpbb_group:phpbb:2.0.19
cpe:/a:phpbb_group:phpbb:2.0_rc1
cpe:/a:phpbb_group:phpbb:2.0.18
cpe:/a:phpbb_group:phpbb:2.0.8
cpe:/a:phpbb_group:phpbb:2.0.8a
cpe:/a:phpbb_group:phpbb:2.0.2
cpe:/a:phpbb_group:phpbb:2.0.13
cpe:/a:phpbb_group:phpbb:2.0.11
cpe:/a:phpbb_group:phpbb:2.0.15
cpe:/a:phpbb_group:phpbb:2.0_rc2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0632
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0632
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200602-127
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/0461
(UNKNOWN)  VUPEN  ADV-2006-0461
http://www.securityfocus.com/archive/1/archive/1/424074/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20060205 Easily exploitable Pseudo Random Number generator in phpbb version 2.0.19 and under.
http://www.r-security.net/tutorials/view/readtutorial.php?id=4
(UNKNOWN)  MISC  http://www.r-security.net/tutorials/view/readtutorial.php?id=4
http://xforce.iss.net/xforce/xfdb/24573
(UNKNOWN)  XF  phpbb-weak-rnd(24573)
http://www.osvdb.org/22949
(UNKNOWN)  OSVDB  22949
http://secunia.com/advisories/18727
(UNKNOWN)  SECUNIA  18727

- 漏洞信息

phpBB gen_rand_string功能电子邮件激活密钥安全信息泄露漏洞
中危 未知
2006-02-10 00:00:00 2006-02-10 00:00:00
远程  
        phpBB 2.0.19中的gen_rand_string功能使用随机数据(小值空间)创建将在建立密码时通过电子邮件发送的激活密钥("验证 ID"),这使得远程攻击者更容易获取密钥并修改现有帐户的密码或创建新帐户。

- 公告与补丁

        

- 漏洞信息

22949
phpBB gen_rand_string() Predictable Random Number Generator (RNG) Weakness
Remote / Network Access Cryptographic
Loss of Confidentiality, Loss of Integrity
Exploit Unknown

- 漏洞描述

phpBB contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is caused by a poor seeding of the pseudorandom number generator when handling forgotten password requests. This flaw may lead to a loss of confidentiality or integrity.

- 时间线

2006-02-05 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站