Erlang/OTP SSH ライブラリで生成される乱数が推測可能な問題
| Title |
Erlang/OTP SSH ライブラリで生成される乱数が推測可能な問題
|
| Summary |
Erlang/OTP SSH ライブラリには、生成される乱数が推測可能な問題が存在します。 Erlang/OTP SSH ライブラリは、生成した乱数を用いて様々な暗号化処理を行います。Erlang/OTP SSH ライブラリで実装されている乱数生成の手法には、生成された乱数が推測可能な問題が存在します。 発見者の報告では以下のように記載されています。 The Erlang/OTP ssh library implements a number of cryptographic operations that depend on cryptographically strong random numbers. Unfortunately the RNG used by the library is not cryptographically strong, and is further weakened by the use of predictable seed material. The RNG (Wichman-Hill) is not mixed with an entropy source. The seed used for all ssh connections in the library is the current time (to approximately microsecond resolution). By observing the time a connection from this library is established, the first two components of the three RNG seed can be guessed.The third component can be recovered by brute-force; trying each possible value (1..1000000). Guessing the exact seed is made easier by the 16 byte random session cookie that the library will send in its plaintext kexinit message. This cookie will be bytes 17-32 of the RNG sequence. Once the session RNG seed is recovered, an attacker can simply perform the same DH key exchange operation as the SSH library and recover the session secret. Additionally, if the ssh library is used on the server side of the connection and DSA host key is used, the private key can be recovered from the kex_dh messages. The secret signing value k is known from the RNG seed (bytes 170 - 190 of the sequence), so with the public DSA key data in the kex_dh_reply message the private part can be recovered by inverting the signature operation.
|
| Possible impacts |
第三者により SSH セッションキーや DSA ホストキーなどが取得される可能性があります。 |
| Solution |
[アップデートする] 開発者が提供する情報をもとにアップデートを適用してください。 アップデートの適用後、SSH セッションキーや DSA ホストキーなどを変更することが推奨されています。 |
| Publication Date |
May 26, 2011, midnight |
| Registration Date |
June 8, 2011, 11:54 a.m. |
| Last Update |
June 8, 2011, 11:54 a.m. |
|
CVSS2.0 : 危険
|
| Score |
7.8
|
| Vector |
AV:N/AC:L/Au:N/C:C/I:N/A:N |
Affected System
| ERLANG |
|
Erlang/OTP バージョン R14B03 より前のバージョン
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2011年06月08日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2011-0766
| Summary |
The random number generator in the Crypto application before 2.0.2.2, and SSH before 2.0.5, as used in the Erlang/OTP ssh library before R14B03, uses predictable seeds based on the current time, which makes it easier for remote attackers to guess DSA host and SSH session keys.
|
| Publication Date |
June 1, 2011, 5:55 a.m. |
| Registration Date |
Jan. 28, 2021, 4:37 p.m. |
| Last Update |
Nov. 21, 2024, 10:24 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:* |
|
2.0.4 |
|
|
| cpe:2.3:a:erlang:erlang\/otp:r14b01:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:erlang:erlang\/otp:r14b:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:erlang:erlang\/otp:r11b-5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:erlang:erlang\/otp:r13b03:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:erlang:erlang\/otp:r13b:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:erlang:erlang\/otp:r12b-5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:erlang:erlang\/otp:r13b04:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:erlang:erlang\/otp:r13b02-1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:erlang:erlang\/otp:r14a:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:erlang:crypto:*:*:*:*:*:*:*:* |
|
2.0.2.1 |
|
|
| cpe:2.3:a:erlang:erlang\/otp:r14b02:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List