CVE-2011-3599
10.10.2011, 10:55
The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.Enginsight
Vendor | Product | Version |
---|---|---|
adam_kennedy | crypt-dsa | 𝑥 ≤ 1.17 |
adam_kennedy | crypt-dsa | 0.01 |
adam_kennedy | crypt-dsa | 0.02 |
adam_kennedy | crypt-dsa | 0.03 |
adam_kennedy | crypt-dsa | 0.10 |
adam_kennedy | crypt-dsa | 0.11 |
adam_kennedy | crypt-dsa | 0.12 |
adam_kennedy | crypt-dsa | 0.13 |
adam_kennedy | crypt-dsa | 0.14 |
adam_kennedy | crypt-dsa | 0.15_01:_01 |
adam_kennedy | crypt-dsa | 1.16 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
References