OpenSSL FIPS Object Module fails to properly generate random seeds

2008-01-03T00:00:00
ID VU:150249
Type cert
Reporter CERT
Modified 2008-01-03T16:27:00

Description

Overview

The OpenSSL FIPS Module fails to perform auto-seeding, which may allow an attacker to predict pseudo-randomly generated data.

Description

OpenSSL is a toolkit that provides SSL and TLS protocols as well as a general purpose cryptography library. The OpenSSL FIPS Object Module provides an API for invoking FIPS-approved cryptographic functions. The OpenSSL FIPS Module fails to properly perform auto-seeding during the FIPS self-test. This causes the PRNG key and seed to correspond to the last self-test. The FIPS PRNG gets additional seed data from the date-time information only.


Impact

An attacker may be able to predict pseudo-randomly generated data from OpenSSL. This can weaken the protection provided by OpenSSL's cryptography.


Solution

Wait for an approved patched distribution

This vulnerability is described in OpenSSL Security Advisory [29-Nov-2007]. This advisory describes the patches that demonstrate two different fixes for the vulnerability. However, FIPS 140-2 validation must be performed before the fixes can be incorporated into a validated module.


Vendor Information

150249

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

OpenSSL __ Affected

Updated: January 03, 2008

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Wait for an approved patched distribution

This vulnerability is described in OpenSSL Security Advisory [29-Nov-2007]. This advisory describes the patches that demonstrate two different fixes for the vulnerability. However, FIPS 140-2 validation must be performed before the fixes can be incorporated into a validated module.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | |
Temporal | |
Environmental | |

References

  • <http://www.openssl.org/news/secadv_20071129.txt>
  • <http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#733>
  • <http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf>
  • <http://csrc.nist.gov/publications/fips/>
  • <http://secunia.com/advisories/27859/>
  • <http://www.securityfocus.com/bid/26652>
  • <http://www.frsirt.com/english/advisories/2007/4044>
  • <http://www.securitytracker.com/id?1019029>

Acknowledgements

This vulnerability was reported by Geoff Lowe of Secure Computing Corporation.

This document was written by Will Dormann.

Other Information

CVE IDs: | CVE-2007-5502
---|---
Severity Metric: | 0.50
Date Public: | 2007-11-30
Date First Published: | 2008-01-03
Date Last Updated: | 2008-01-03 16:27 UTC
Document Revision: | 5