Published: 2008-05-19T22:52+00:00    Last Updated: 2008-05-22T18:57+00:00

TRTA08-137A
Debian/Ubuntu OpenSSL Random Number Generator Vulnerability

Overview

A vulnerability in the OpenSSL package included with the Debian GNU/Linux operating system and its derivatives may cause weak cryptographic keys to be generated. Any package that uses the affected version of SSL could be vulnerable.

Event Information

Date (UTC)Description
2008-05-20 17:11 Symantec
ThreatCON (2) => (1)
No significant attacks are known to be targeting the recently disclosed SSH vulnerability affecting Debian and Ubuntu computers. All activity identified last week on port 22 has also subsided.
2008-05-16 21:56 SANS Internet Storm Center
INFOcon back to green
The Debian/Ubuntu SSL problem by now has sufficient media attention. Once the big security firms raise their threat level indicators, we at SANS ISC can go back to green :).
2008-05-16 18:17 US-CERT
TA08-137A: Microsoft Updates for Multiple Vulnerabilities
Via US-CERT Mailing List
2008-05-16 07:02 JPCERT/CC
JPCERT-AT-2008-0007: OpenSSL packages contain a predictable random number generator
2008-05-15 23:29 Bugtraq
Debian OpenSSL Predictable PRNG Bruteforce SSH Exploit (ruby)
Debian SSH Key Tester
#Cid: debian_openssh_key_tester.rb
#Cid: 29179.rb
2008-05-15 21:27 Symantec
ThreatCON (2) => (2)
Debian, Ubuntu, and variants have an issue in the OpenSSL library that generates weak cryptographic keys. Users are urged to update their software and to regenerate new keys with the corrected OpenSSL library.
2008-05-15 15:30 SANS Internet Storm Center
INFOCon yellow: update your Debian generated keys/certs ASAP (Version: 2)
As you can see, we raised the INFOCon level to yellow. The main idea behind INFOCon is to protect the Internet infrastructure at large, and the development on automated scripts exploiting key based SSH authentication looks like a real threat to SSH servers around the world (any SSH server using public keys that were generated on a vulnerable Debian machine - meaning - the keys had to be generated on a Debian machine between September 2006 and 13th of May 2008).
2008-05-15 14:35 Bugtraq
Remote Host Key Scanner
SSH Key Tester
This script tests whether a target SSH server is vulnerable to the major weak SSL key bug found in May 2008
#Cid: seb-test-vul-ssh-host-rel1.sh
2008-05-15 12:38 US-CERT
Debian and Ubuntu OpenSSL and OpenSSH Vulnerabilities
US-CERT Current Activity
Debian and Ubuntu have released multiple security advisories to address vulnerabilities in their OpenSSL package and other cryptographic application packages that rely on it. These vulnerabilities are due to weaknesses in the random number generator that is used to create SSL and SSH cryptographic keys.
2008-05-15 12:02 SANS Internet Storm Center
Debian and Ubuntu users: fix your keys/certificates NOW (Version: 2)
Today Matt wrote in to let us know that H D Moore posted a web page containing all SSH 1024, 2048 and 4096-bit RSA keys he brute forced.
2008-05-14 18:00 Bugtraq
Debian OpenSSL Predictable PRNG Bruteforce SSH Exploit
Debian SSH Key Tester
#Cid: debian_ssh_rsa_2048_x86.tar.bz2
2008-05-14 Debian
DSA-1576: openssh -- predictable random number generator
The recently announced vulnerability in Debian's openssl package (DSA-1571-1, CVE-2008-0166) indirectly affects OpenSSH.
2008-05-13 21:30 SANS Internet Storm Center
OpenSSH: Predictable PRNG in debian and ubuntu Linux (Version: 4)
Debian and Ubuntu Linux users should look into their OpenSSH setup. It turns out the PRNG (Pseudo Random Number Generator) as used was predictable.
2008-05-13 13:50 Debian
A detector for known weak key material
2008-05-13 Debian
DSA-1571: openssl -- predictable random number generator
The random number generator in Debian's openssl package is predictable. This is caused by an incorrect Debian-specific change to the openssl package (CVE-2008-0166). As a result, cryptographic key material may be guessable.

Other Information