Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote SSL certificate uses a weak key.

Description :

The remote x509 certificate on the remote SSL server has been generated
on a Debian or Ubuntu system which contains a bug in the random number
generator of its OpenSSL library.

The problem is due to a Debian packager removing nearly all sources of
entropy in the remote version of OpenSSL.

An attacker can easily obtain the private part of the remote key and use
this to decipher the remote session or set up a man in the middle
attack.

See also :

http://www.nessus.org/u?5d01bdab
http://www.nessus.org/u?f14f4224

Solution :

Consider all cryptographic material generated on the remote host to be
guessable. In particuliar, all SSH, SSL and OpenVPN key material should
be re-generated.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 32321 ()

Bugtraq ID: 29179

CVE ID: CVE-2008-0166