The Net::EasyTCP package before 0.15 for Perl always uses Perl's builtin rand(), which is not a strong random number generator, for cryptographic keys.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2002-2426 | The Net::EasyTCP package before 0.15 for Perl always uses Perl's builtin rand(), which is not a strong random number generator, for cryptographic keys. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 06 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Jan 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-338 | |
| Metrics |
cvssV3_1
|
Thu, 02 Jan 2025 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Net::EasyTCP package before 0.15 for Perl always uses Perl's builtin rand(), which is not a strong random number generator, for cryptographic keys. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-06T21:08:29.156Z
Reserved: 2025-01-02T00:00:00
Link: CVE-2002-20002
Updated: 2025-01-06T21:08:24.787Z
Status : Received
Published: 2025-01-02T05:15:06.430
Modified: 2025-01-02T05:15:06.430
Link: CVE-2002-20002
No data.
OpenCVE Enrichment
No data.
EUVD