First published: Sat Feb 25 2006(Updated: )
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Crypt-CBC | =2.13 | |
Crypt-CBC | =2.00 | |
Crypt-CBC | =1.24 | |
Crypt-CBC | =2.09 | |
Crypt-CBC | =2.05 | |
Crypt-CBC | =2.10 | |
Crypt-CBC | =2.04 | |
Crypt-CBC | =1.21 | |
Crypt-CBC | =2.12 | |
Crypt-CBC | =2.11 | |
Crypt-CBC | =2.15 | |
Crypt-CBC | =2.02 | |
Crypt-CBC | =2.08 | |
Crypt-CBC | =2.03 | |
Crypt-CBC | =1.25 | |
Crypt-CBC | =1.20 | |
Crypt-CBC | =1.22 | |
Crypt-CBC | =2.14 | |
Crypt-CBC | =1.10 | |
Crypt-CBC | =2.07 | |
Crypt-CBC | =1.00 | |
Crypt-CBC | =2.01 | |
Crypt-CBC | <=2.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0898 is considered a moderate severity vulnerability due to its impact on encryption strength.
To fix CVE-2006-0898, upgrade to a version of the Crypt::CBC Perl module that is greater than 2.16.
Versions 2.16 and earlier of the Crypt::CBC Perl module are affected by CVE-2006-0898.
CVE-2006-0898 weakens encryption when using ciphers with block sizes larger than 8 bytes, such as Rijndael.
Yes, CVE-2006-0898 is a known vulnerability that has been documented in various security advisories.