CVE-2016-1902

The nextBytes function in the SecureRandom class in Symfony before 2.3.37, 2.6.x before 2.6.13, and 2.7.x before 2.7.9 does not properly generate random numbers when used with PHP 5.x without the paragonie/random_compat library and the openssl_random_pseudo_bytes function fails, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:sensiolabs:symfony:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.10:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.9:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.8:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.12:*:*:*:*:*:*:*

Information

Published : 2016-06-01 15:59

Updated : 2016-06-03 07:58


NVD link : CVE-2016-1902

Mitre link : CVE-2016-1902


JSON object : View

CWE
CWE-310

Cryptographic Issues

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

sensiolabs

  • symfony