A security issue has been reported in OpenSSL, which can potentially be exploited by malicious people to bypass certain security restrictions.
The security issue is caused due to an error in the implementation of the Pseudo Random Number Generator (PRNG), where a PRNG key and seed are used that correspond to the last FIPS self-test. This leads to predictable generated random data and may weaken the security of applications relying on the module.
The security issue affects version 1.1.1.
Solution: The vendor has issued two patches that demonstrate fixes for the security issue.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: OpenSSL FIPS Object Module PRNG Security Issue
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.