Weak Random Number Generation in Net::EasyTCP for Perl by MNAGUIB
CVE-2002-20002

5.4MEDIUM

Key Information:

Vendor
MNAGUIB
Vendor
CVE Published:
2 January 2025

Summary

The Net::EasyTCP package prior to version 0.15 for Perl is vulnerable due to its reliance on Perl's built-in rand() function for generating cryptographic keys. This function is not suitable for cryptographic purposes as it does not provide strong randomness, potentially leading to predictable key generation and exposing systems to various security risks. Users of affected versions are encouraged to update to a secure version to mitigate these vulnerabilities.

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.