CVE-2006-0898

Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:lincoln_d._stein:crypt_cbc:*:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.00:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.10:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.20:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.21:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.22:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.24:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.25:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.00:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.01:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.02:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.03:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.04:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.05:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.07:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.08:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.09:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.10:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.11:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.12:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.13:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.14:*:*:*:*:*:*:*
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.15:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-02-25 11:02

Updated : 2024-02-04 16:52


NVD link : CVE-2006-0898

Mitre link : CVE-2006-0898

CVE.ORG link : CVE-2006-0898


JSON object : View

Products Affected

lincoln_d._stein

  • crypt_cbc