Vulnerability Description
The gen_rand_string function in phpBB 2.0.19 uses insufficiently random data (small value space) to create the activation key ("validation ID") that is sent by e-mail when establishing a password, which makes it easier for remote attackers to obtain the key and modify passwords for existing accounts or create new accounts.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpbb Group | Phpbb | 2.0.0 |
References
- http://secunia.com/advisories/18727
- http://www.osvdb.org/22949
- http://www.r-security.net/tutorials/view/readtutorial.php?id=4Exploit
- http://www.securityfocus.com/archive/1/424074/100/0/threaded
- http://www.vupen.com/english/advisories/2006/0461
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24573
- http://secunia.com/advisories/18727
- http://www.osvdb.org/22949
- http://www.r-security.net/tutorials/view/readtutorial.php?id=4Exploit
- http://www.securityfocus.com/archive/1/424074/100/0/threaded
- http://www.vupen.com/english/advisories/2006/0461
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24573
FAQ
What is CVE-2006-0632?
CVE-2006-0632 is a vulnerability with a CVSS score of 6.4 (MEDIUM). The gen_rand_string function in phpBB 2.0.19 uses insufficiently random data (small value space) to create the activation key ("validation ID") that is sent by e-mail when establishing a password, whi...
How severe is CVE-2006-0632?
CVE-2006-0632 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0632?
Check the references section above for vendor advisories and patch information. Affected products include: Phpbb Group Phpbb.