[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2010-3171Date: (C)2010-09-15   (M)2024-03-27


The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack." NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-5913.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.8
Exploit Score: 8.6
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: NONE
  
Reference:
http://archives.neohapsis.com/archives/bugtraq/2010-09/0117.html
SECUNIA-42867
BID-43222
ADV-2011-0061
http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
http://www.trusteer.com/sites/default/files/Cross_domain_Math_Random_leakage_in_FF_3.6.4-3.6.8.pdf
https://bugzilla.mozilla.org/show_bug.cgi?id=577512
oval:org.mitre.oval:def:7370

CPE    7
cpe:/a:mozilla:firefox:3.6.6
cpe:/a:mozilla:firefox:3.6.7
cpe:/a:mozilla:firefox:3.6.4
cpe:/a:mozilla:firefox:3.5.10
...
CWE    1
CWE-310
OVAL    1
oval:org.mitre.oval:def:7370

© SecPod Technologies