Vulnerability Description
The nextBytes function in the SecureRandom class in Symfony before 2.3.37, 2.6.x before 2.6.13, and 2.7.x before 2.7.9 does not properly generate random numbers when used with PHP 5.x without the paragonie/random_compat library and the openssl_random_pseudo_bytes function fails, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 8.0 |
| Sensiolabs | Symfony | <= 2.3.36 |
Related Weaknesses (CWE)
References
- http://symfony.com/blog/cve-2016-1902-securerandom-s-fallback-not-secure-when-opVendor Advisory
- http://www.debian.org/security/2016/dsa-3588
- https://github.com/symfony/symfony/pull/17359Patch
- https://www.landaire.net/blog/cve-2016-1902-symfony-securerandom/
- http://symfony.com/blog/cve-2016-1902-securerandom-s-fallback-not-secure-when-opVendor Advisory
- http://www.debian.org/security/2016/dsa-3588
- https://github.com/symfony/symfony/pull/17359Patch
- https://www.landaire.net/blog/cve-2016-1902-symfony-securerandom/
FAQ
What is CVE-2016-1902?
CVE-2016-1902 is a vulnerability with a CVSS score of 7.5 (HIGH). The nextBytes function in the SecureRandom class in Symfony before 2.3.37, 2.6.x before 2.6.13, and 2.7.x before 2.7.9 does not properly generate random numbers when used with PHP 5.x without the para...
How severe is CVE-2016-1902?
CVE-2016-1902 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1902?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Sensiolabs Symfony.