The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.
References
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2011-10-10 03:55
Updated : 2011-10-20 19:56
NVD link : CVE-2011-3599
Mitre link : CVE-2011-3599
JSON object : View
CWE
CWE-310
Cryptographic Issues
Products Affected
adam_kennedy
- crypt-dsa
perl
- perl