Ubuntu Security Notice (C) 2008-2013 Canonical, Inc. / NASL script (C) 2008-2013 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related patches.
Matt Zimmerman discovered that entries in ~/.ssh/authorized_keys with
options (such as 'no-port-forwarding' or forced commands) were ignored
by the new ssh-vulnkey tool introduced in OpenSSH (see USN-612-2).
This could cause some compromised keys not to be listed in
This update also adds more information to ssh-vulnkey's manual page.
A weakness has been discovered in the random number generator used by
OpenSSL on Debian and Ubuntu systems. As a result of this weakness,
certain encryption keys are much more common than they should be, such
that an attacker could guess the key through a brute-force attack
given minimal knowledge of the system. This particularly affects the
use of encryption keys in OpenSSH, OpenVPN and SSL certificates.
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.4
Public Exploit Available : true