FKIE_CVE-2008-1484

Vulnerability from fkie_nvd - Published: 2008-03-24 23:44 - Updated: 2026-04-23 00:35
Severity ?
Summary
The password reset feature in PunBB 1.2.16 and earlier uses predictable random numbers based on the system time, which allows remote authenticated users to determine the new password via a brute force attack on a seed that is based on the approximate creation time of the targeted account. NOTE: this issue might be related to CVE-2006-5737.
Impacted products
Vendor Product Version
punbb punbb 1.0
punbb punbb 1.0.1
punbb punbb 1.0_alpha
punbb punbb 1.0_beta1
punbb punbb 1.0_beta2
punbb punbb 1.0_beta3
punbb punbb 1.0_rc1
punbb punbb 1.0_rc2
punbb punbb 1.1
punbb punbb 1.1.1
punbb punbb 1.1.2
punbb punbb 1.1.3
punbb punbb 1.1.4
punbb punbb 1.1.5
punbb punbb 1.2
punbb punbb 1.2.1
punbb punbb 1.2.2
punbb punbb 1.2.3
punbb punbb 1.2.4
punbb punbb 1.2.5
punbb punbb 1.2.6
punbb punbb 1.2.7
punbb punbb 1.2.8
punbb punbb 1.2.9
punbb punbb 1.2.10
punbb punbb 1.2.11
punbb punbb 1.2.12
punbb punbb 1.2.13
punbb punbb 1.2.14
punbb punbb 1.2.15
punbb punbb 1.2.16

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F62C7C-EA7A-40B2-A8A0-5FEA69DF321B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8827471A-6FCC-48A6-BBAA-6DC82EA42EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.0_alpha:*:*:*:*:*:*:*",
              "matchCriteriaId": "C68B349F-F76D-49D2-95DA-C8670E32530A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.0_beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB336F6C-E81A-43C2-A252-36A192D9CADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.0_beta2:*:*:*:*:*:*:*",
              "matchCriteriaId": "91EBBB6B-A4F7-45A3-8BAB-26CEBCD3156E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.0_beta3:*:*:*:*:*:*:*",
              "matchCriteriaId": "53C4E00F-E370-4DD1-B760-8AA0CEC4E536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00082231-3168-4FCC-807B-8AD3DBBFCE92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77FF770-BEB4-4320-AA45-399A5CC6540A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E04494D1-FE7F-431C-8242-A0591A5D0A6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97DA335-4815-4608-84D5-67F4E539D8F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9481F02E-2523-4599-A39D-3ACE518CEC35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "01C976DD-47E4-48CA-AF99-93D0653D31F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1AAB3BF-EBFA-4F55-A3D4-0B26F749D91E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7277A122-5963-4E7F-BA1A-62B19AF804EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEF85286-A1F8-4797-99F0-4F42B6D859CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "05BCF8A0-5530-4B36-8CEA-5330307C74CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EDF1AE-B415-4B5B-80CD-0B96AFA21D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDBA41AF-C817-476A-8ED1-57808D0B678C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C353C194-328F-4C4C-9773-F06A0FA3978C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE58D68-FC34-4F70-849A-2E6CC919230D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5713E747-5529-4A64-95B4-D9678D8E88B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C920E92-B2AE-416D-9669-9A4FBFE0AE8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DFD4225-32F9-4D62-87C5-9632A1C03326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A75787B-6156-4710-9B24-48C5763E7771",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "20A9473E-DE15-4BE2-839D-90B55F8713EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4A94FF3-C732-4552-A32B-53C4739F7E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "01063CD1-BCE0-4C0A-AE34-AC4CCFD5802B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C427E4AB-79A3-4B9E-BD73-35F8BE03B93C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CDCB2E5-91A9-48D8-8B98-19E770CEB1E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD30AB1-3E59-4981-9DFD-E7270D9C009E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:punbb:punbb:1.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4546E547-54E1-4FB9-9F20-7C70B9F86BC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The password reset feature in PunBB 1.2.16 and earlier uses predictable random numbers based on the system time, which allows remote authenticated users to determine the new password via a brute force attack on a seed that is based on the approximate creation time of the targeted account.  NOTE: this issue might be related to CVE-2006-5737."
    },
    {
      "lang": "es",
      "value": "La caracter\u00edstica de reinicializaci\u00f3n de contrase\u00f1a en PunBB 1.2.16 y anteriores utiliza n\u00fameros aleatorios previsibles basados en la hora del sistema, lo que permite a usuarios autentificados remotamente averiguar la nueva contrase\u00f1a a trav\u00e9s de un ataque de fuerza bruta con una semilla que est\u00e1 basada en la creaci\u00f3n aproximada de la cuenta objetivo. NOTA: este caso podr\u00eda estar relacionado con CVE-2006-5737."
    }
  ],
  "id": "CVE-2008-1484",
  "lastModified": "2026-04-23T00:35:47.467",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-24T23:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/45561"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://punbb.org/forums/viewtopic.php?id=18460"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29043"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sektioneins.de/advisories/SE-2008-01.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/488408/100/200/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27908"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/45561"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://punbb.org/download/changelogs/1.2.16_to_1.2.17.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://punbb.org/forums/viewtopic.php?id=18460"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sektioneins.de/advisories/SE-2008-01.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/488408/100/200/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5165"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…