Vulnerability Name:

CVE-2006-0632 (CCN-24892)

Assigned:2005-12-22
Published:2005-12-22
Updated:2018-10-19
Summary:The gen_rand_string function in phpBB 2.0.19 uses insufficiently random data (small value space) to create the activation key ("validation ID") that is sent by e-mail when establishing a password, which makes it easier for remote attackers to obtain the key and modify passwords for existing accounts or create new accounts.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Data Manipulation
References:Source: MITRE
Type: CNA
CVE-2005-3537

Source: MITRE
Type: CNA
CVE-2006-0632

Source: CCN
Type: SA18727
phpBB "gen_rand_string()" Predictable RNG Weakness

Source: SECUNIA
Type: UNKNOWN
18727

Source: DEBIAN
Type: DSA-925
phpbb2 -- several vulnerabilities

Source: OSVDB
Type: UNKNOWN
22949

Source: CCN
Type: OSVDB ID: 22271
phpBB Unspecified Arbitrary Private Message Modification

Source: CCN
Type: OSVDB ID: 22949
phpBB gen_rand_string() Predictable Random Number Generator (RNG) Weakness

Source: CCN
Type: OSVDB ID: 49587
phpBB Search Function search_id Value PHP PRNG State Disclosure

Source: CCN
Type: phpBB Web site
phpBB:: Creating Communities

Source: MISC
Type: Exploit
http://www.r-security.net/tutorials/view/readtutorial.php?id=4

Source: BUGTRAQ
Type: UNKNOWN
20060205 Easily exploitable Pseudo Random Number generator in phpbb version 2.0.19 and under.

Source: CCN
Type: BID-15246
PHPBB Multiple Unspecified Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2006-0461

Source: XF
Type: UNKNOWN
phpbb-weak-rnd(24573)

Source: XF
Type: UNKNOWN
phpbb-validation-error-modify(24892)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.6c:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.6d:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.7a:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.8a:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0_beta1:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0_rc3:*:*:*:*:*:*:*
  • OR cpe:/a:phpbb_group:phpbb:2.0_rc4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    phpbb_group phpbb 2.0.0
    phpbb_group phpbb 2.0.1
    phpbb_group phpbb 2.0.2
    phpbb_group phpbb 2.0.3
    phpbb_group phpbb 2.0.4
    phpbb_group phpbb 2.0.5
    phpbb_group phpbb 2.0.6
    phpbb_group phpbb 2.0.6c
    phpbb_group phpbb 2.0.6d
    phpbb_group phpbb 2.0.7
    phpbb_group phpbb 2.0.7a
    phpbb_group phpbb 2.0.8
    phpbb_group phpbb 2.0.8a
    phpbb_group phpbb 2.0.9
    phpbb_group phpbb 2.0.10
    phpbb_group phpbb 2.0.11
    phpbb_group phpbb 2.0.12
    phpbb_group phpbb 2.0.13
    phpbb_group phpbb 2.0.14
    phpbb_group phpbb 2.0.15
    phpbb_group phpbb 2.0.16
    phpbb_group phpbb 2.0.17
    phpbb_group phpbb 2.0.18
    phpbb_group phpbb 2.0.19
    phpbb_group phpbb 2.0_beta1
    phpbb_group phpbb 2.0_rc1
    phpbb_group phpbb 2.0_rc2
    phpbb_group phpbb 2.0_rc3
    phpbb_group phpbb 2.0_rc4