Debian災(zāi)難性漏洞
更新時(shí)間:2008年05月19日 20:15:20 作者:
Debian OpenSSL包里的算法有問(wèn)題,random number生成居然是在process pid里選取,導(dǎo)致生成key可窮舉
以下摘自metasploit的blog
The Bug
On May 13th, 2008 the Debian project announced that Luciano Bello found an interesting vulnerability in the OpenSSL package they were distributing. The bug in question was caused by the removal of the following line of code from md_rand.c
MD_Update(&m,buf,j);
[ .. ]
MD_Update(&m,buf,j); /* purify complains */
These lines were removed because they caused the Valgrind and Purify tools to produce warnings about the use of uninitialized data in any code that was linked to OpenSSL. You can see one such report to the OpenSSL team here. Removing this code has the side effect of crippling the seeding process for the OpenSSL PRNG. Instead of mixing in random data for the initial seed, the only “random” value that was used was the current process ID. On the Linux platform, the default maximum process ID is 32,768, resulting in a very small number of seed values being used for all PRNG operations.
所有在2006.9月到2008.5.13的debian平臺(tái)上生成的key均受影響。 debian很快修復(fù)了此漏洞,并給出了blacklists和自查工具。
攻擊工具應(yīng)該很快會(huì)出現(xiàn),metasploit已經(jīng)生成了key的數(shù)據(jù)庫(kù),可以用類(lèi)似rainbow的方法去查詢(xún),也可以直接暴力破解ssh key。
現(xiàn)在就等worm什么時(shí)候出現(xiàn)了。
因?yàn)檫@個(gè)漏洞比較嚴(yán)重,所以特此記錄,立此存照。
相關(guān)鏈接:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=363516
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=363516
http://metasploit.com/users/hdm/tools/debian-openssl/
http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/61666
http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/61606
http://www.debian.org/security/2008/dsa-1571
The Bug
On May 13th, 2008 the Debian project announced that Luciano Bello found an interesting vulnerability in the OpenSSL package they were distributing. The bug in question was caused by the removal of the following line of code from md_rand.c
MD_Update(&m,buf,j);
[ .. ]
MD_Update(&m,buf,j); /* purify complains */
These lines were removed because they caused the Valgrind and Purify tools to produce warnings about the use of uninitialized data in any code that was linked to OpenSSL. You can see one such report to the OpenSSL team here. Removing this code has the side effect of crippling the seeding process for the OpenSSL PRNG. Instead of mixing in random data for the initial seed, the only “random” value that was used was the current process ID. On the Linux platform, the default maximum process ID is 32,768, resulting in a very small number of seed values being used for all PRNG operations.
所有在2006.9月到2008.5.13的debian平臺(tái)上生成的key均受影響。 debian很快修復(fù)了此漏洞,并給出了blacklists和自查工具。
攻擊工具應(yīng)該很快會(huì)出現(xiàn),metasploit已經(jīng)生成了key的數(shù)據(jù)庫(kù),可以用類(lèi)似rainbow的方法去查詢(xún),也可以直接暴力破解ssh key。
現(xiàn)在就等worm什么時(shí)候出現(xiàn)了。
因?yàn)檫@個(gè)漏洞比較嚴(yán)重,所以特此記錄,立此存照。
相關(guān)鏈接:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=363516
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=363516
http://metasploit.com/users/hdm/tools/debian-openssl/
http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/61666
http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/61606
http://www.debian.org/security/2008/dsa-1571
相關(guān)文章
曉宇聽(tīng)幽網(wǎng)站內(nèi)容管理系統(tǒng) V2.0
曉宇聽(tīng)幽網(wǎng)站內(nèi)容管理系統(tǒng) V2.0...2007-01-01網(wǎng)友舉報(bào):屁屁寬頻軟件自帶木馬病毒(圖)
網(wǎng)友舉報(bào):屁屁寬頻軟件自帶木馬病毒(圖)...2007-01-01利用DWRCC突破天網(wǎng)防火墻(經(jīng)驗(yàn))(圖)
利用DWRCC突破天網(wǎng)防火墻(經(jīng)驗(yàn))(圖)...2007-01-01利用Session欺騙構(gòu)造最隱蔽的WebShell
利用Session欺騙構(gòu)造最隱蔽的WebShell...2007-01-01Advanced SQL Injection with MySQL
Advanced SQL Injection with MySQL...2007-01-01Sql Server 應(yīng)用程序的高級(jí)Sql注入
這篇文章討論常用的"sql注入"技術(shù)的細(xì)節(jié),應(yīng)用于流行的Ms IIS/ASP/SQL-Server平臺(tái)。這里探討有關(guān)這種攻擊各種可以注入程序訪(fǎng)問(wèn)數(shù)據(jù)和數(shù)據(jù)庫(kù)防范的方法。2009-01-01