Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2006-0898


Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.


Published

2006-02-25T11:02:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 2.6 (LOW)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

4.9

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application lincoln_d._stein crypt_cbc ≤ 2.16 Yes
Application lincoln_d._stein crypt_cbc 1.00 Yes
Application lincoln_d._stein crypt_cbc 1.10 Yes
Application lincoln_d._stein crypt_cbc 1.20 Yes
Application lincoln_d._stein crypt_cbc 1.21 Yes
Application lincoln_d._stein crypt_cbc 1.22 Yes
Application lincoln_d._stein crypt_cbc 1.24 Yes
Application lincoln_d._stein crypt_cbc 1.25 Yes
Application lincoln_d._stein crypt_cbc 2.00 Yes
Application lincoln_d._stein crypt_cbc 2.01 Yes
Application lincoln_d._stein crypt_cbc 2.02 Yes
Application lincoln_d._stein crypt_cbc 2.03 Yes
Application lincoln_d._stein crypt_cbc 2.04 Yes
Application lincoln_d._stein crypt_cbc 2.05 Yes
Application lincoln_d._stein crypt_cbc 2.07 Yes
Application lincoln_d._stein crypt_cbc 2.08 Yes
Application lincoln_d._stein crypt_cbc 2.09 Yes
Application lincoln_d._stein crypt_cbc 2.10 Yes
Application lincoln_d._stein crypt_cbc 2.11 Yes
Application lincoln_d._stein crypt_cbc 2.12 Yes
Application lincoln_d._stein crypt_cbc 2.13 Yes
Application lincoln_d._stein crypt_cbc 2.14 Yes
Application lincoln_d._stein crypt_cbc 2.15 Yes

References