Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <e7be087e-d638-40cf-9be5-517aed96a2f5@cpan.org>
Date: Thu, 5 Mar 2026 08:53:43 +0000
From: Robert Rothenberg <rrwo@...n.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-57854: Net::NSCA::Client versions through 0.009002 for Perl
 uses a poor random number generator

========================================================================
CVE-2024-57854                                       CPAN Security Group
========================================================================

         CVE ID:  CVE-2024-57854
   Distribution:  Net-NSCA-Client
       Versions:  through 0.009002

       MetaCPAN:  https://metacpan.org/dist/Net-NSCA-Client
       VCS Repo:  https://github.com/dougwilson/perl5-net-nsca-client


Net::NSCA::Client versions through 0.009002 for Perl uses a poor random
number generator

Description
-----------
Net::NSCA::Client versions through 0.009002 for Perl uses a poor random
number generator.

Version v0.003 switched to use Data::Rand::Obscure instead of
Crypt::Random for generation of a random initialisation vectors.

Data::Rand::Obscure uses Perl's built-in rand() function, which is not
suitable for cryptographic functions.

Problem types
-------------
- CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator
   (PRNG)

Solutions
---------
Apply a manual patch or migrate to a different solution


References
----------
https://metacpan.org/release/DOUGDUDE/Net-NSCA-Client-0.009002/source/lib/Net/NSCA/Client/InitialPacket.pm#L119
https://patch-diff.githubusercontent.com/raw/dougwilson/perl5-net-nsca-client/pull/2.patch

Credits
-------
Robert Rothenberg, finder

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.