Vulnerabilities > CVE-2014-0016 - Insufficient Entropy in PRNG vulnerability in Stunnel

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
stunnel
CWE-332
nessus

Summary

stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for EC (ECDSA) or DSA certificates.

Vulnerable Configurations

Part Description Count
Application
Stunnel
120

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201408-14.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201408-14 (stunnel: Information disclosure) stunnel does not properly update the state of the pseudo-random generator after fork-threading which causes subsequent children with the same process ID to use the same entropy pool. ECDSA and DSA keys, when not used in deterministic mode (RFC6979), rely on random data for its k parameter to not leak private key information. Impact : A remote attacker may gain access to private key information from ECDSA or DSA keys. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id77458
    published2014-08-30
    reporterThis script is Copyright (C) 2014-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77458
    titleGLSA-201408-14 : stunnel: Information disclosure
  • NASL familyWindows
    NASL idSTUNNEL_5_00.NASL
    descriptionThe version of stunnel installed on the remote host is prior to version 5.00. It is, therefore, affected by a security weakness due to the PRNG state not being reset for new connections where the server forks. A remote attacker can exploit this issue to disclose sensitive information, such as the private key used for EC (ECDSA) or DSA certificates. Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id73212
    published2014-03-26
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/73212
    titlestunnel < 5.00 PRNG State Security Weakness
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2015-096.NASL
    descriptionUpdated stunnel package fixes security vulnerability : A flaw was found in the way stunnel, a socket wrapper which can provide SSL support to ordinary applications, performed (re)initialization of PRNG after fork. When accepting a new connection, the server forks and the child process handles the request. The RAND_bytes() function of openssl doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id82349
    published2015-03-30
    reporterThis script is Copyright (C) 2015-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82349
    titleMandriva Linux Security Advisory : stunnel (MDVSA-2015:096)

Seebug

bulletinFamilyexploit
descriptionBugtraq ID:65964 CVE ID:CVE-2014-0016 Stunnel是一个自由的跨平台软件,用于提供全局的TLS / SSL 服务。 Stunnel存在安全漏洞,套接字封装程序可对普通应用程序提供SSL支持,在fork后执行PRNG初始化,当接受新连接时,服务器fork(),子进程处理请求。OpenSSLRAND_bytes()函数在fork后没有重置其状态,而是简单的添加当前进程ID(getpid)至PRNG状态,可导致使用EC (ECDSA)或DSA证书的服务器在某些情况下泄漏私钥。 0 Stunnel 目前没有详细解决方案提供: http://www.stunnel.org
idSSV:61718
last seen2017-11-19
modified2014-03-11
published2014-03-11
reporterRoot
titleStunnel PRING初始化漏洞