Security Advisories (3)
Net::Dropbear versions through 0.16 for Perl contains a dependency that may be susceptible to an integer overflow. Net::DropbearĀ embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.
Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.
The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.
Module Install Instructions
To install Net::Dropbear, copy and paste the appropriate command in to your terminal.
cpanm Net::Dropbear
perl -MCPAN -e shell
install Net::Dropbear
For more information on module installation, please visit the detailed CPAN module installation guide.