First published: Wed Oct 05 2011(Updated: )
It has been reported that Crypt::DSA, a Perl module for DSA signatures and key generation, used cryptographically weak / insecure method for random numbers generation on systems, where /dev/random file was not present. Due this flaw an attacker could be able to discover some portions of / whole secret DSA key, which has been created on such system. References: [1] <a href="http://secunia.com/advisories/46275/">http://secunia.com/advisories/46275/</a> [2] <a href="https://rt.cpan.org/Public/Bug/Display.html?id=71421">https://rt.cpan.org/Public/Bug/Display.html?id=71421</a> Proposed upstream patch is to remove the affected fallback code part: [3] <a href="https://rt.cpan.org/Public/Bug/Display.html?id=71421#txn-984052">https://rt.cpan.org/Public/Bug/Display.html?id=71421#txn-984052</a> (though not approved yet)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/perl-Crypt-DSA-1.17 | <10. | 10. |
Crypt-DSA (Adam Kennedy) | <=1.17 | |
Crypt-DSA (Adam Kennedy) | =0.01 | |
Crypt-DSA (Adam Kennedy) | =0.02 | |
Crypt-DSA (Adam Kennedy) | =0.03 | |
Crypt-DSA (Adam Kennedy) | =0.10 | |
Crypt-DSA (Adam Kennedy) | =0.11 | |
Crypt-DSA (Adam Kennedy) | =0.12 | |
Crypt-DSA (Adam Kennedy) | =0.13 | |
Crypt-DSA (Adam Kennedy) | =0.14 | |
Crypt-DSA (Adam Kennedy) | =0.15_01 | |
Crypt-DSA (Adam Kennedy) | =1.16 | |
Perl 5.30.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3599 is considered a high severity vulnerability due to its potential to allow attackers to compromise cryptographic security.
To fix CVE-2011-3599, you should upgrade the Crypt::DSA Perl module to version 1.17 or later.
CVE-2011-3599 affects Crypt::DSA versions prior to 1.17, including versions 0.01 through 1.16.
CVE-2011-3599 is a cryptographic flaw involving weak random number generation.
The affected software, Crypt::DSA, is maintained by Adam Kennedy.