Логотип exploitDog
bind:CVE-2025-40918
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-40918

Количество 9

Количество 9

ubuntu логотип

CVE-2025-40918

5 месяцев назад

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely. The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. According to RFC 2831, The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation depends on a good choice. It is RECOMMENDED that it contain at least 64 bits of entropy.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2025-40918

5 месяцев назад

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely. The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. According to RFC 2831, The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation depends on a good choice. It is RECOMMENDED that it contain at least 64 bits of entropy.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2025-40918

5 месяцев назад

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely. The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. According to RFC 2831, The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation depends on a good choice. It is RECOMMENDED that it contain at least 64 bits of entropy.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2025-40918

5 месяцев назад

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl g ...

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03088-1

4 месяца назад

Security update for perl-Authen-SASL, perl-Crypt-URandom

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03087-1

4 месяца назад

Security update for perl-Authen-SASL, perl-Crypt-URandom

EPSS: Низкий
github логотип

GHSA-496q-8ph2-c4fj

5 месяцев назад

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely. The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. According to RFC 2831, The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation depends on a good choice. It is RECOMMENDED that it contain at least 64 bits of entropy.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2025-10918

5 месяцев назад

Уязвимость языка программирования Perl, связанная с использованием небезопасной программы генератора случайных чисел, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
redos логотип

ROS-20250827-05

4 месяца назад

Уязвимость perl-Authen-SASL

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-40918

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely. The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. According to RFC 2831, The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation depends on a good choice. It is RECOMMENDED that it contain at least 64 bits of entropy.

CVSS3: 6.5
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-40918

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely. The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. According to RFC 2831, The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation depends on a good choice. It is RECOMMENDED that it contain at least 64 bits of entropy.

CVSS3: 5.9
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-40918

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely. The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. According to RFC 2831, The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation depends on a good choice. It is RECOMMENDED that it contain at least 64 bits of entropy.

CVSS3: 6.5
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-40918

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl g ...

CVSS3: 6.5
0%
Низкий
5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03088-1

Security update for perl-Authen-SASL, perl-Crypt-URandom

0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03087-1

Security update for perl-Authen-SASL, perl-Crypt-URandom

0%
Низкий
4 месяца назад
github логотип
GHSA-496q-8ph2-c4fj

Authen::SASL::Perl::DIGEST_MD5 versions 2.04 through 2.1800 for Perl generates the cnonce insecurely. The cnonce (client nonce) is generated from an MD5 hash of the PID, the epoch time and the built-in rand function. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. According to RFC 2831, The cnonce-value is an opaque quoted string value provided by the client and used by both client and server to avoid chosen plaintext attacks, and to provide mutual authentication. The security of the implementation depends on a good choice. It is RECOMMENDED that it contain at least 64 bits of entropy.

CVSS3: 6.5
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-10918

Уязвимость языка программирования Perl, связанная с использованием небезопасной программы генератора случайных чисел, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
5 месяцев назад
redos логотип
ROS-20250827-05

Уязвимость perl-Authen-SASL

CVSS3: 6.5
0%
Низкий
4 месяца назад

Уязвимостей на страницу