The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4120-1 libnet-easytcp-perl security update
EUVD EUVD EUVD-2024-53441 The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 08 Apr 2025 09:45:00 +0000

Type Values Removed Values Added
References

Mon, 06 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Jan 2025 05:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-338
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Thu, 02 Jan 2025 05:00:00 +0000

Type Values Removed Values Added
Description The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-04-08T09:03:27.274Z

Reserved: 2025-01-02T00:00:00.000Z

Link: CVE-2024-56830

cve-icon Vulnrichment

Updated: 2025-04-08T09:03:27.274Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-02T05:15:07.967

Modified: 2025-04-08T09:15:23.627

Link: CVE-2024-56830

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.