{"vuid":"VU#150249","idnumber":"150249","name":"OpenSSL FIPS Object Module fails to properly generate random seeds","keywords":["OpenSSL","FIPS","Object Module","authentication bypass","PRNG","generate random seeds"],"overview":"The OpenSSL FIPS Module fails to perform auto-seeding, which may allow an attacker to predict pseudo-randomly generated data.","clean_desc":"OpenSSL is a toolkit that provides SSL and TLS protocols as well as a general purpose cryptography library. The OpenSSL FIPS Object Module provides an API for invoking FIPS-approved cryptographic functions. The OpenSSL FIPS Module fails to properly perform auto-seeding during the FIPS self-test. This causes the PRNG key and seed to correspond to the last self-test. The FIPS PRNG gets additional seed data from the date-time information only.","impact":"An attacker may be able to predict pseudo-randomly generated data from OpenSSL. This can weaken the protection provided by OpenSSL's cryptography.","resolution":"Wait for an approved patched distribution\nThis vulnerability is described in OpenSSL Security Advisory [29-Nov-2007]. This advisory describes the patches that demonstrate two different fixes for the vulnerability. However, FIPS 140-2 validation must be performed before the fixes can be incorporated into a validated module.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Geoff Lowe of Secure Computing Corporation.","author":"This document was written by Will Dormann.","public":["http://www.openssl.org/news/secadv_20071129.txt","http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#733","http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf","http://csrc.nist.gov/publications/fips/","http://secunia.com/advisories/27859/","http://www.securityfocus.com/bid/26652","http://www.frsirt.com/english/advisories/2007/4044","http://www.securitytracker.com/id?1019029"],"cveids":["CVE-2007-5502"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-12-04T16:51:05Z","publicdate":"2007-11-30T00:00:00Z","datefirstpublished":"2008-01-03T16:26:06Z","dateupdated":"2008-01-03T16:27:46Z","revision":5,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"18","cam_population":"20","cam_impact":"2","cam_easeofexploitation":"2","cam_attackeraccessrequired":"10","cam_scorecurrent":"0.495","cam_scorecurrentwidelyknown":"0.57","cam_scorecurrentwidelyknownexploited":"0.87","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.495,"vulnote":null}