The PRNG implementation for the OpenSSL FIPS Object Module 1.1.1 does not perform auto-seeding during the FIPS self-test, which generates random data that is more predictable than expected and makes it easier for attackers to bypass protection mechanisms that rely on the randomness.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2007/4044 | vdb entry |
http://www.securityfocus.com/bid/26652 | vdb entry patch |
http://www.securitytracker.com/id?1019029 | vdb entry |
http://www.openssl.org/news/secadv_20071129.txt | |
http://secunia.com/advisories/27859 | third party advisory patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38796 | vdb entry |
http://www.kb.cert.org/vuls/id/150249 | third party advisory us government resource |