First published: Tue May 03 2005(Updated: )
SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =5.04 | |
Ubuntu Linux | =5.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0106 is considered a medium severity vulnerability due to its potential impact on cryptographic operations.
To fix CVE-2005-0106, update the libnet-ssleay-perl module to version 1.25 or later.
CVE-2005-0106 affects Ubuntu Linux version 5.04 and any systems using an affected version of libnet-ssleay-perl.
Exploiting CVE-2005-0106 allows local users to weaken the cryptographic strength of certain operations by modifying the /tmp/entropy file.
Yes, CVE-2005-0106 is related to improper file permissions, as it allows local users to manipulate a critical entropy file.