The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/76025 - | |
References | () http://secunia.com/advisories/46275 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2011/10/05/5 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2011/10/05/9 - Patch | |
References | () http://www.securityfocus.com/bid/49928 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=743567 - Patch | |
References | () https://rt.cpan.org/Public/Bug/Display.html?id=71421 - Patch |
Information
Published : 2011-10-10 10:55
Updated : 2024-11-21 01:30
NVD link : CVE-2011-3599
Mitre link : CVE-2011-3599
CVE.ORG link : CVE-2011-3599
JSON object : View
Products Affected
perl
- perl
adam_kennedy
- crypt-dsa
CWE
CWE-310
Cryptographic Issues