{"id":"CVE-2006-0898","details":"Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.","modified":"2026-01-27T04:06:27.698061Z","published":"2006-02-25T11:02:00Z","withdrawn":"2026-01-27T04:06:27.698061Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2008-0630.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/18755"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19187"},{"type":"ADVISORY","url":"http://secunia.com/advisories/19303"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20899"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31493"},{"type":"ADVISORY","url":"http://www.debian.org/security/2006/dsa-996"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_38_security.html"},{"type":"FIX","url":"http://www.securityfocus.com/bid/16802"},{"type":"WEB","url":"http://securityreason.com/securityalert/488"},{"type":"WEB","url":"http://www.gentoo.org/security/en/glsa/glsa-200603-15.xml"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2008-0261.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/425966/100/0/threaded"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24954"}],"schema_version":"1.7.3"}