The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 01:30
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://osvdb.org/76025 - | |
| References | () http://secunia.com/advisories/46275 - Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2011/10/05/5 - Patch | |
| References | () http://www.openwall.com/lists/oss-security/2011/10/05/9 - Patch | |
| References | () http://www.securityfocus.com/bid/49928 - | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=743567 - Patch | |
| References | () https://rt.cpan.org/Public/Bug/Display.html?id=71421 - Patch | 
Information
                Published : 2011-10-10 10:55
Updated : 2025-04-11 00:51
NVD link : CVE-2011-3599
Mitre link : CVE-2011-3599
CVE.ORG link : CVE-2011-3599
JSON object : View
Products Affected
                perl
- perl
adam_kennedy
- crypt-dsa
CWE
                
                    
                        
                        CWE-310
                        
            Cryptographic Issues
