First published: Sun May 22 2016(Updated: )
The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <7.0.0 | 7.0.0 |
PHP | >=5.4.0<5.4.44 | |
PHP | >=5.5.0<5.5.28 | |
PHP | >=5.6.0<5.6.12 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8867 is considered a medium severity vulnerability due to its potential impact on cryptographic protection mechanisms.
To fix CVE-2015-8867, upgrade PHP to version 5.4.44, 5.5.28, 5.6.12 or later.
CVE-2015-8867 affects PHP versions prior to 5.4.44, 5.5.28, and 5.6.12.
CVE-2015-8867 could allow remote attackers to undermine cryptographic protections in your application.
CVE-2015-8867 impacts PHP installations across various operating systems, including specific versions of Ubuntu.