Vulnerability Details CVE-2006-0898
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.011
EPSS Ranking 76.8%
CVSS Severity
CVSS v2 Score 2.6
Products affected by CVE-2006-0898
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:*
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.00
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.10
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.20
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.21
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.22
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.24
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:1.25
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.00
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.01
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.02
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.03
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.04
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.05
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.07
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.08
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.09
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.10
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.11
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.12
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.13
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.14
-
cpe:2.3:a:lincoln_d._stein:crypt_cbc:2.15