Debian and Ubuntu OpenSSL Vulnerability

Filed under Vulnerabilities

<%image(20080517-debian-girl.jpg|137|103|Debian Girl)%>

I won’t go into all the details since every other security blogger on earth is covering it….however, as a reminder this issue is pretty serious if you had generated any keys on affected Debian or Ubuntu systems. The best summary I have found of the issue with links to all the “toys” that have come out to attack this vulnerability are on HD Moore’s web site. Here is a summary from HD:

“All SSL and SSH keys generated on Debian-based systems (Ubuntu, Kubuntu, etc) between September 2006 and May 13th, 2008 may be affected. In the case of SSL keys, all generated certificates will be need to recreated and sent off to the Certificate Authority to sign. Any Certificate Authority keys generated on a Debian-based system will need be regenerated and revoked. All system administrators that allow users to access their servers with SSH and public key authentication need to audit those keys to see if any of them were created on a vulnerabile system. Any tools that relied on OpenSSL’s PRNG to secure the data they transferred may be vulnerable to an offline attack. Any SSH server that uses a host key generated by a flawed system is subject to traffic decryption and a man-in-the-middle attack would be invisible to the users. This flaw is ugly because even systems that do not use the Debian software need to be audited in case any key is being used that was created on a Debian system.

Ugly vulnerability is right for an OS that changes you….


  1. Seems to be a pretty big topic in the security field as we covered it on episode 2 of the SecuraBit podcast.

  2. Tom says:

    Yes, it is! Seems everyone is talking about it. BTW, love the podcast…keep up the good work!

  3. Quzart says:

    Seems you can crack the keys in under 20 min 😛

  4. Anonymous says:

    I thought Linux was so secure? // lulz

Post a Comment

Your email is never published nor shared. Required fields are marked *