Описание
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.17-1 |
devel | released | 2.17-1 |
edgy | released | 2.17-1 |
feisty | released | 2.17-1 |
gutsy | released | 2.17-1 |
upstream | needs-triage |
Показывать по
Ссылки на источники
2.6 Low
CVSS2
Связанные уязвимости
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode ...
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
2.6 Low
CVSS2