CVE-2011-3599

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 60%
VendorProductVersion
adam_kennedycrypt-dsa
𝑥
≤ 1.17
adam_kennedycrypt-dsa
0.01
adam_kennedycrypt-dsa
0.02
adam_kennedycrypt-dsa
0.03
adam_kennedycrypt-dsa
0.10
adam_kennedycrypt-dsa
0.11
adam_kennedycrypt-dsa
0.12
adam_kennedycrypt-dsa
0.13
adam_kennedycrypt-dsa
0.14
adam_kennedycrypt-dsa
0.15_01:_01
adam_kennedycrypt-dsa
1.16
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libcrypt-dsa-perl
bullseye
1.17-4
fixed
bookworm
1.17-5
fixed
sid
1.17-5
fixed
trixie
1.17-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libcrypt-dsa-perl
natty
dne
maverick
dne
lucid
dne
hardy
dne
Common Weakness Enumeration