Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-3599

Опубликовано: 10 окт. 2011
Источник: debian
EPSS Низкий

Описание

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libcrypt-dsa-perlfixed1.17-3package

Примечания

  • All supported Debian kernels have /dev/random, so severity unimportant

EPSS

Процентиль: 58%
0.00358
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

nvd
больше 14 лет назад

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

github
больше 3 лет назад

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

EPSS

Процентиль: 58%
0.00358
Низкий