Debian灾难 's

admin 2017年5月6日20:09:40评论353 views字数 1408阅读4分41秒阅读模式
摘要

by axis
2008-05-16
http://www.ph4nt0m.orgDebian OpenSSL包里的算法有问题,random number生成居然是在process pid里选取,导致生成key可穷举

by axis
2008-05-16
http://www.ph4nt0m.org

Debian OpenSSL包里的算法有问题,random number生成居然是在process pid里选取,导致生成key可穷举

以下摘自metasploit的blog
The Bug
On May 13th, 2008 the Debian project announced that Luciano Bello found an interesting vulnerability in the OpenSSL package they were distributing. The bug in question was caused by the removal of the following line of code from md_rand.c

MD_Update(&m,buf,j);
[ .. ]
MD_Update(&m,buf,j); /* purify complains */

These lines were removed because they caused the Valgrind and Purify tools to produce warnings about the use of uninitialized data in any code that was linked to OpenSSL. You can see one such report to the OpenSSL team here. Removing this code has the side effect of crippling the seeding process for the OpenSSL PRNG. Instead of mixing in random data for the initial seed, the only “random” value that was used was the current process ID. On the Linux platform, the default maximum process ID is 32,768, resulting in a very small number of seed values being used for all PRNG operations.

所有在2006.9月到2008.5.13的debian平台上生成的key均受影响。 debian很快修复了此漏洞,并给出了blacklists和自查工具。

攻击工具应该很快会出现,metasploit已经生成了key的数据库,可以用类似rainbow的方法去查询,也可以直接暴力破解ssh key。

现在就等worm什么时候出现了。

因为这个漏洞比较严重,所以特此记录,立此存照。

相关链接:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=363516
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=363516
http://metasploit.com/users/hdm/tools/debian-openssl/
http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/61666
http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/61606
http://www.debian.org/security/2008/dsa-1571

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2017年5月6日20:09:40
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Debian灾难 'shttps://cn-sec.com/archives/47802.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息