2.6
CVSSv2

CVE-2006-0898

Published: 25/02/2006 Updated: 18/10/2018
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Summary

Crypt::CBC Perl module 2.16 and previous versions, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.

Vulnerable Product Search on Vulmon Subscribe to Product

lincoln d. stein crypt cbc 1.24

lincoln d. stein crypt cbc 1.25

lincoln d. stein crypt cbc 2.07

lincoln d. stein crypt cbc 2.08

lincoln d. stein crypt cbc 2.15

lincoln d. stein crypt cbc

lincoln d. stein crypt cbc 1.21

lincoln d. stein crypt cbc 1.22

lincoln d. stein crypt cbc 2.04

lincoln d. stein crypt cbc 2.05

lincoln d. stein crypt cbc 2.13

lincoln d. stein crypt cbc 2.14

lincoln d. stein crypt cbc 1.00

lincoln d. stein crypt cbc 2.00

lincoln d. stein crypt cbc 2.01

lincoln d. stein crypt cbc 2.09

lincoln d. stein crypt cbc 2.10

lincoln d. stein crypt cbc 1.10

lincoln d. stein crypt cbc 1.20

lincoln d. stein crypt cbc 2.02

lincoln d. stein crypt cbc 2.03

lincoln d. stein crypt cbc 2.11

lincoln d. stein crypt cbc 2.12

Vendor Advisories

Lincoln Stein discovered that the Perl Crypt::CBC module produces weak ciphertext when used with block encryption algorithms with blocksize > 8 bytes The old stable distribution (woody) does not contain a Crypt::CBC module For the stable distribution (sarge) this problem has been fixed in version 212-1sarge1 For the unstable distribution (si ...