Net::NSCA::Client versions through 0.009002 for Perl uses a poor random number generator.
Version v0.003 switched to use Data::Rand::Obscure instead of Crypt::Random for generation of a random initialisation vectors.
Data::Rand::Obscure uses Perl's built-in rand() function, which is not suitable for cryptographic functions.
References
| Link | Resource |
|---|---|
| https://metacpan.org/release/DOUGDUDE/Net-NSCA-Client-0.009002/source/lib/Net/NSCA/Client/InitialPacket.pm#L119 | Issue Tracking Product |
| https://patch-diff.githubusercontent.com/raw/dougwilson/perl5-net-nsca-client/pull/2.patch | Patch |
| http://www.openwall.com/lists/oss-security/2026/03/05/1 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-05 03:15
Updated : 2026-03-09 14:58
NVD link : CVE-2024-57854
Mitre link : CVE-2024-57854
CVE.ORG link : CVE-2024-57854
JSON object : View
Products Affected
dougdude
- net\
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
