The PRNG implementation for the OpenSSL FIPS Object Module 1.1.1 does not perform auto-seeding during the FIPS self-test, which generates random data that is more predictable than expected and makes it easier for attackers to bypass protection mechanisms that rely on the randomness.
References
Configurations
History
21 Nov 2024, 00:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/27859 - Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/150249 - US Government Resource | |
References | () http://www.openssl.org/news/secadv_20071129.txt - | |
References | () http://www.securityfocus.com/bid/26652 - Patch | |
References | () http://www.securitytracker.com/id?1019029 - | |
References | () http://www.vupen.com/english/advisories/2007/4044 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/38796 - |
Information
Published : 2007-12-01 06:46
Updated : 2024-11-21 00:38
NVD link : CVE-2007-5502
Mitre link : CVE-2007-5502
CVE.ORG link : CVE-2007-5502
JSON object : View
Products Affected
openssl
- fips_object_module
CWE
CWE-310
Cryptographic Issues