[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[linux-security] openssl RNG weaknesses
- To: linux-security
- Subject: [linux-security] openssl RNG weaknesses
- From: Martin Siegert <siegert@sfu.ca>
- Date: Fri, 20 Jul 2001 18:30:51 -0700
- User-Agent: Mutt/1.2.5i
Topic
=====
predictability of random number sequences in openssl
Problem Description
===================
The pseudo-random number generator (PRNG) in SSLeay/OpenSSL versions
up to 0.9.6a is weakened by a design error. Knowing the output of
specific PRNG requests (including a number of consecutive very short
PRNG requests) would allow an attacker to determine the PRNG's
internal state and thus to predict future PRNG output.
Affected Systems
================
Systems that use openssl versions < 0.9.6b
Solution
========
upgrade to openssl-0.9.6b (or patched version for your distribution)
RedHat 6.x
----------
rpm -Fvh openssl-0.9.5a-7.6.x.i386.rpm \
openssl-devel-0.9.5a-7.6.x.i386.rpm \
openssl-perl-0.9.5a-7.6.x.i386.rpm \
openssl-python-0.9.5a-7.6.x.i386.rpm
RedHat 7.0
----------
rpm -Fvh openssl-0.9.6-9.i386.rpm \
openssl-devel-0.9.6-9.i386.rpm \
openssl-perl-0.9.6-9.i386.rpm \
openssl-python-0.9.6-9.i386.rpm \
openssl095a-0.9.5a-9.i386.rpm
RedHat 7.1
----------
rpm -Fvh openssl-0.9.6-9.i386.rpm \
openssl-devel-0.9.6-9.i386.rpm \
openssl-perl-0.9.6-9.i386.rpm \
openssl-python-0.9.6-9.i386.rpm \
openssl095a-0.9.5a-9.i386.rpm \
nss_ldap-149-4.i386.rpm
Mandrake 7.1
------------
rpm -Fvh openssl-0.9.5a-3.1mdk.i586.rpm openssl-devel-0.9.5a-3.1mdk.i586.rpm
Mandrake 7.2
------------
rpm -Fvh openssl-0.9.5a-8.1mdk.i586.rpm openssl-devel-0.9.5a-8.1mdk.i586.rpm
Mandrake 8.0
------------
rpm -Fvh openssl-0.9.6-7.1mdk.i586.rpm openssl-devel-0.9.6-7.1mdk.i586.rpm