CVE-2016-1902

The nextBytes function in the SecureRandom class in Symfony before 2.3.37, 2.6.x before 2.6.13, and 2.7.x before 2.7.9 does not properly generate random numbers when used with PHP 5.x without the paragonie/random_compat library and the openssl_random_pseudo_bytes function fails, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 59%
VendorProductVersion
debiandebian_linux
8.0
sensiolabssymfony
𝑥
≤ 2.3.36
sensiolabssymfony
2.6.0
sensiolabssymfony
2.6.1
sensiolabssymfony
2.6.2
sensiolabssymfony
2.6.3
sensiolabssymfony
2.6.4
sensiolabssymfony
2.6.5
sensiolabssymfony
2.6.6
sensiolabssymfony
2.6.7
sensiolabssymfony
2.6.8
sensiolabssymfony
2.6.9
sensiolabssymfony
2.6.10
sensiolabssymfony
2.6.11
sensiolabssymfony
2.6.12
sensiolabssymfony
2.7.0
sensiolabssymfony
2.7.1
sensiolabssymfony
2.7.2
sensiolabssymfony
2.7.3
sensiolabssymfony
2.7.4
sensiolabssymfony
2.7.5
sensiolabssymfony
2.7.6
sensiolabssymfony
2.7.7
sensiolabssymfony
2.7.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
symfony
bullseye
4.4.19+dfsg-2+deb11u6
fixed
bookworm
5.4.23+dfsg-1+deb12u2
fixed
sid
6.4.13+dfsg-1
fixed
trixie
6.4.13+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
symfony
xenial
not-affected
wily
ignored
vivid
ignored
trusty
dne
precise
dne
Common Weakness Enumeration