The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Crypt-dsa | Adam_kennedy | * | 1.17 (including) |
Crypt-dsa | Adam_kennedy | 0.01 (including) | 0.01 (including) |
Crypt-dsa | Adam_kennedy | 0.02 (including) | 0.02 (including) |
Crypt-dsa | Adam_kennedy | 0.03 (including) | 0.03 (including) |
Crypt-dsa | Adam_kennedy | 0.10 (including) | 0.10 (including) |
Crypt-dsa | Adam_kennedy | 0.11 (including) | 0.11 (including) |
Crypt-dsa | Adam_kennedy | 0.12 (including) | 0.12 (including) |
Crypt-dsa | Adam_kennedy | 0.13 (including) | 0.13 (including) |
Crypt-dsa | Adam_kennedy | 0.14 (including) | 0.14 (including) |
Crypt-dsa | Adam_kennedy | 0.15_01 (including) | 0.15_01 (including) |
Crypt-dsa | Adam_kennedy | 1.16 (including) | 1.16 (including) |