Rapid7 Vulnerability & Exploit Database

Debian's OpenSSL Library Predictable Random Number Generator

Back to Search

Debian's OpenSSL Library Predictable Random Number Generator

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
05/13/2008
Created
07/25/2018
Added
06/05/2008
Modified
02/13/2015

Description

A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of encryption keys in OpenSSH, OpenVPN and SSL certificates. This vulnerability only affects operating systems which are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.

Solution(s)

  • fix-openssl-debian-weak-keys

References

  • fix-openssl-debian-weak-keys

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;