Executive Summary
Summary | |
---|---|
Title | Erlang/OTP SSH library uses a weak random number generator |
Informations | |||
---|---|---|---|
Name | VU#178990 | First vendor Publication | 2011-05-25 |
Vendor | VU-CERT | Last vendor Modification | 2011-05-25 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#178990Erlang/OTP SSH library uses a weak random number generatorOverviewThe Erlang/OTP SSH library's random number generator is not cryptographically strong because it relies on predictable seed material.I. DescriptionGeoff Cant's report states:The Erlang/OTP ssh library implements a number of cryptographic operations that depend on cryptographically strong random numbers. Unfortunately the RNG used by the library is not cryptographically strong, and is further weakened by the use of predictable seed material. The RNG (Wichman-Hill) is not mixed with an entropy source. A patch has been committed for issue "ssh 2.0.5 OTP 9225" to the Erlang/OTP source that remediates the vulnerability. All SSH DSA keys used with the vulnerable library should be changed. Any password or secret sent over a connection that used the vulnerable library should be changed as well.
Referenceshttps://github.com/erlang/otp/commit/f228601de45c5b53241b103af6616453c50885a5 Thanks to Geoff Cant for reporting this vulnerability. This document was written by Jared Allar.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/178990 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-310 | Cryptographic Issues |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-08-03 | Name : FreeBSD Ports: erlang File : nvt/freebsd_erlang.nasl |
2011-08-02 | Name : Fedora Update for erlang FEDORA-2011-9598 File : nvt/gb_fedora_2011_9598_erlang_fc15.nasl |
2011-08-02 | Name : Fedora Update for erlang FEDORA-2011-9657 File : nvt/gb_fedora_2011_9657_erlang_fc14.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
73264 | Erlang/OTP SSH Predictable Seed Insecure Random Number Generator Weakness |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-08-01 | Name : The remote Fedora host is missing a security update. File : fedora_2011-9598.nasl - Type : ACT_GATHER_INFO |
2011-08-01 | Name : The remote Fedora host is missing a security update. File : fedora_2011-9657.nasl - Type : ACT_GATHER_INFO |
2011-05-26 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_e483392786e511e0a6b4000a5e1e33c6.nasl - Type : ACT_GATHER_INFO |