Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.


Synopsis :

The remote SSL certificate uses a weak key.

Description :

The remote x509 certificate on the remote SSL server has been generated
on a Debian or Ubuntu system which contains a bug in the random number
generator of its OpenSSL library.

The problem is due to a Debian packager removing nearly all sources of
entropy in the remote version of OpenSSL.

An attacker can easily obtain the private part of the remote key and use
this to decipher the remote session or set up a man in the middle
attack.

See also :

http://www.nessus.org/u?5d01bdab
http://www.nessus.org/u?f14f4224

Solution :

Consider all cryptographic material generated on the remote host to be
guessable. In particuliar, all SSH, SSL and OpenVPN key material should
be re-generated.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 32321 ()

Bugtraq ID: 29179

CVE ID: CVE-2008-0166

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial