ID CVE-2010-3399
Summary The js_InitRandom function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a context pointer in conjunction with its successor pointer for seeding of a random number generator, which makes it easier for remote attackers to guess the seed value via a brute-force attack, a different vulnerability than CVE-2010-3171.
References
Vulnerable Configurations
  • cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 19-09-2017 - 01:31)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:N
oval via4
accepted 2014-10-06T04:04:33.467-04:00
class vulnerability
contributors
  • name SecPod Team
    organization SecPod Technologies
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Evgeniy Pavlov
    organization ALTX-SOFT
  • name Evgeniy Pavlov
    organization ALTX-SOFT
  • name Evgeniy Pavlov
    organization ALTX-SOFT
definition_extensions
comment Mozilla Firefox Mainline release is installed
oval oval:org.mitre.oval:def:22259
description The js_InitRandom function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a context pointer in conjunction with its successor pointer for seeding of a random number generator, which makes it easier for remote attackers to guess the seed value via a brute-force attack, a different vulnerability than CVE-2010-3171.
family windows
id oval:org.mitre.oval:def:7598
status accepted
submitted 2010-10-21T14:10:18
title Vulnerability in js_InitRandom function in the JavaScript implementation in Mozilla Firefox
version 26
refmap via4
bugtraq 20100914 New writeup by Amit Klein (Trusteer): "Cross-domain information leakage in Firefox 3.6.4-3.6.8, Firefox 3.5.10-3.5.11 and Firefox 4.0 Beta1"
confirm http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
misc
secunia 42867
vupen ADV-2011-0061
Last major update 19-09-2017 - 01:31
Published 15-09-2010 - 20:00
Last modified 19-09-2017 - 01:31
Back to Top