Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.

Synopsis :

The remote SSL certificate uses a weak key.

Description :

The remote x509 certificate on the remote SSL server has been generated
on a Debian or Ubuntu system which contains a bug in the random number
generator of its OpenSSL library.

The problem is due to a Debian packager removing nearly all sources of
entropy in the remote version of OpenSSL.

An attacker can easily obtain the private part of the remote key and use
this to decipher the remote session or set up a man in the middle

See also :

Solution :

Consider all cryptographic material generated on the remote host to be
guessable. In particuliar, all SSH, SSL and OpenVPN key material should
be re-generated.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 32321 ()

Bugtraq ID: 29179

CVE ID: CVE-2008-0166

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now