CVE-2011-3599

critical

Description

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

References

https://rt.cpan.org/Public/Bug/Display.html?id=71421

https://bugzilla.redhat.com/show_bug.cgi?id=743567

http://www.securityfocus.com/bid/49928

http://www.openwall.com/lists/oss-security/2011/10/05/9

http://www.openwall.com/lists/oss-security/2011/10/05/5

http://secunia.com/advisories/46275

http://osvdb.org/76025

Details

Source: Mitre, NVD

Published: 2011-10-10

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Critical