CVE-2016-1902

The nextBytes function in the SecureRandom class in Symfony before 2.3.37, 2.6.x before 2.6.13, and 2.7.x before 2.7.9 does not properly generate random numbers when used with PHP 5.x without the paragonie/random_compat library and the openssl_random_pseudo_bytes function fails, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.9:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.10:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:sensiolabs:symfony:2.7.8:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-06-01 22:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-1902

Mitre link : CVE-2016-1902

CVE.ORG link : CVE-2016-1902


JSON object : View

Products Affected

sensiolabs

  • symfony

debian

  • debian_linux
CWE
CWE-310

Cryptographic Issues