Debian has issued an update for OpenSSL. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system, and a security issue, which can lead to weak cryptographic key material.
1) The security issue is caused due to the random number generator in Debian's openssl package being predictable. This may lead to weak cryptographic key material being generated e.g. for SSH keys, OpenVPN keys, DNSSEC keys, and key material for use in X.509 certificates and session keys used in SSL/TLS connections.
The security issue is reported in Debian's OpenSSL packages starting with 0.9.8c-1 (uploaded to the unstable distribution on 2006-09-17) and affects all keys generated with an affected package.
2) An unspecified error within the DTLS implementation can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Debian OpenSSL Predictable Random Number Generator and Update
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.