CVE-2006-0898

Loading...

General

Score:2.6/10.0
Severity:Low
Category:N/A
Exploit:Available

Impact Metrics

Confidentiality:Partial
Integrity:None
Availability:None

Exploitability Metrics

Access Vector:Network
Access Complexity:High
Authentication:None

Relative vulnerabilities

CVE-2004-0687, CVE-2004-0688, CVE-2004-0885, CVE-2004-0914, CVE-2005-0605, CVE-2005-2090, CVE-2005-3510, CVE-2005-3964, CVE-2005-4838, CVE-2006-0254, CVE-2006-1329, CVE-2006-3835, CVE-2006-5752, CVE-2006-7195, CVE-2006-7196, CVE-2006-7197, CVE-2007-0243, CVE-2007-0450, CVE-2007-1349, CVE-2007-1355, CVE-2007-1358, CVE-2007-1860, CVE-2007-2435, CVE-2007-2449, CVE-2007-2450, CVE-2007-2788, CVE-2007-2789, CVE-2007-3304, CVE-2007-3382, CVE-2007-3385, CVE-2007-4465, CVE-2007-5000, CVE-2007-5461, CVE-2007-5961, CVE-2007-6306, CVE-2007-6388, CVE-2008-0128, CVE-2008-2369

Published on 25/02/06 - Updated on 18/10/18

Description

Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.

Category: N/A

NVD-CWE-Other (Other)
NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset.

Security Notices

US National Vulnerability DatabaseCVE-2006-0898
Redhat RHSA-2008:0261, RHSA-2008:0524, RHSA-2008:0630

Exploits

SecurityFocusBID-16802

Relative technologies

VendorProduct
lincoln_d._steincrypt_cbc

Share this vulnerability with:

Twitter Facebook LinkedIn Mail