[Cialug] Fw: US-CERT Technical Cyber Security Alert TA08-137A -- Debian/Ubuntu OpenSSL Random Number Generator Vulnerability

albus albus at iowaconnect.com
Mon May 19 09:20:19 CDT 2008


Just a FYI.
Most of you probably already know, but for those that may not.


----- Original Message ----- 
From: "CERT Advisory" <cert-advisory at cert.org>
To: <cert-advisory at cert.org>
Sent: Friday, May 16, 2008 1:18 PM
Subject: US-CERT Technical Cyber Security Alert TA08-137A -- Debian/Ubuntu OpenSSL Random Number Generator Vulnerability


> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
>    National Cyber Alert System
>   
>   Technical Cyber Security Alert TA08-137A
> 
> 
> Debian/Ubuntu OpenSSL Random Number Generator Vulnerability
> 
>   Original release date: May 16, 2008
>   Last revised: --
>   Source: US-CERT
> 
> Systems Affected
> 
>     * Debian, Ubuntu, and Debian-based distributions
> 
> Overview
> 
>   A  vulnerability  in  the  OpenSSL  package  included  with the Debian
>   GNU/Linux   operating  system  and  its  derivatives  may  cause  weak
>   cryptographic keys to be generated. Any package that uses the affected
>   version of SSL could be vulnerable.
> 
> I. Description
> 
>   A  vulnerabiliity  exists  in  the random number generator used by the
>   OpenSSL  package included with the Debian GNU/Linux, Ubuntu, and other
>   Debian-based   operating   systems.   This  vulnerability  causes  the
>   generated numbers to be predictable.
> 
>   The result of this error is that certain encryption keys are much more
>   common  than  they should be. This vulnerability affects cryptographic
>   applications  that  use  keys  generated by the flawed versions of the
>   OpenSSL package. Affected keys include, but may not be limited to, SSH
>   keys,  OpenVPN  keys,  DNSSEC  keys, and key material for use in X.509
>   certificates  and  session  keys  used  in SSL/TLS connections. Any of
>   these keys generated using the affected systems on or after 2006-09-17
>   may be vulnerable. Keys generated with GnuPG, GNUTLS, ccrypt, or other
>   encryption  utilities  that  do  not  use  OpenSSL  are not vulnerable
>   because these applications use their own random number generators.
> 
> II. Impact
> 
>   A  remote,  unauthenticated  attacker  may be able to guess secret key
>   material.  The  attacker may also be able to gain authenticated access
>   to    the   system   through   the   affected   service   or   perform
>   man-in-the-middle attacks.
> 
> III. Solution
> 
> Upgrade
> 
>   Debian  and  Ubuntu have released fixed versions of OpenSSL to address
>   this  issue. System administrators can use the ssh-vulnkey application
>   to  check  for  compromised  or weak SSH keys. After applying updates,
>   clients using weak keys may be refused by servers.
> 
> Workaround
> 
>   Until  updates can be applied, administrators and users are encouraged
>   to  restrict  access  to  vulnerable servers. Debian- and Ubuntu-based
>   systems   can   use   iptables,   iptables   configuration  tools,  or
>   tcp-wrappers to limit access.
> 
> 
> IV. References
> 
> * DSA-1571-1 openssl - predictable random number generator  -
>   <http://www.debian.org/security/2008/dsa-1571>
>     
> * Debian wiki - SSL keys - <http://wiki.debian.org/SSLkeys>
>     
> * Ubuntu OpenSSL vulnerability -
>   <http://www.ubuntu.com/usn/usn-612-1>
>     
> * Ubuntu OpenSSH vulnerability -
>   <http://www.ubuntu.com/usn/usn-612-2>
>     
> * Ubuntu OpenVPN vulnerability -
>   <http://www.ubuntu.com/usn/usn-612-3>Ubuntu SSL-cert vulnerability
> 
> * Ubuntu OpenSSH update - <http://www.ubuntu.com/usn/usn-612-5>
>     
> * Ubuntu OpenVPN regression - <http://www.ubuntu.com/usn/usn-612-6>
>     
> * OpenVPN regression - <http://www.ubuntu.com/usn/usn-612-6>
> 
> 
> _________________________________________________________________
> 
>  The most recent version of this document can be found at:
> 
>    <http://www.us-cert.gov/cas/techalerts/TA08-137A.html>
> _________________________________________________________________
> 
>  Feedback can be directed to US-CERT Technical Staff. Please send
>  email to <cert at cert.org> with "TA08-137A Feedback VU#925211" in the
>  subject.
> _________________________________________________________________
> 
>  For instructions on subscribing to or unsubscribing from this
>  mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
> _________________________________________________________________
> 
>  Produced 2008 by US-CERT, a government organization.
> 
>  Terms of use:
> 
>    <http://www.us-cert.gov/legal.html>
> ____________________________________________________________________
> 
>  Revision History
> 
>  May 16, 2008: Initial release
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.1 (GNU/Linux)
> 
> iQEVAwUBSC3OLvRFkHkM87XOAQIY6Qf/RywAJKkMBte71mgV+XKHOFH9yLy+vOGs
> HlC35oyfpijFSPI1TyYpN9vvpvfhL8DDDG6/dNBt+u1uVskcurb5Rh1UMmpEEFg0
> kVGos6JDD18T6JpfgvEY9k+4iVAGApNirEYRDsKFVRho/3CaJQ6Tdp/jf3NEzmNE
> DPgsEA0n825kBd0dr/v3yT5S9wYsn5x9n6OfyHShXVwYPK/V3jEXbU0uZo0Nt7HX
> L0FIVTz5tMWIm1LoTsh+GeE0dsnsg/0+qf1jRRq66GQ+3eMGO/wepTbUmqGCXF0s
> I+O756V/mDxrPePJRNcpCjtGZCEjtMNJ4fZPQhosxbNVPpvDV5rGlQ==
> =93LZ
> -----END PGP SIGNATURE-----
> 
>



More information about the Cialug mailing list