This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.
The remote SSL certificate uses a weak key.
The remote x509 certificate on the remote SSL server has been generated
on a Debian or Ubuntu system which contains a bug in the random number
generator of its OpenSSL library.
The problem is due to a Debian packager removing nearly all sources of
entropy in the remote version of OpenSSL.
An attacker can easily obtain the private part of the remote key and use
this to decipher the remote session or set up a man in the middle
See also :
Consider all cryptographic material generated on the remote host to be
guessable. In particuliar, all SSH, SSL and OpenVPN key material should
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true
Family: Gain a shell remotely
Nessus Plugin ID: 32321 ()
Bugtraq ID: 29179
CVE ID: CVE-2008-0166
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.