ID CVE-2010-3171
Summary The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack." NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-5913.
References
Vulnerable Configurations
  • cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 19-09-2017 - 01:31)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:N
oval via4
accepted 2014-10-06T04:04:28.574-04:00
class vulnerability
contributors
  • name SecPod Team
    organization SecPod Technologies
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Evgeniy Pavlov
    organization ALTX-SOFT
  • name Evgeniy Pavlov
    organization ALTX-SOFT
  • name Evgeniy Pavlov
    organization ALTX-SOFT
definition_extensions
comment Mozilla Firefox Mainline release is installed
oval oval:org.mitre.oval:def:22259
description The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack." NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-5913.
family windows
id oval:org.mitre.oval:def:7370
status accepted
submitted 2010-10-21T14:10:18
title Vulnerability in the Math.random function in the JavaScript implementation in Mozilla Firefox
version 25
refmap via4
bid 43222
bugtraq 20100914 New writeup by Amit Klein (Trusteer): "Cross-domain information leakage in Firefox 3.6.4-3.6.8, Firefox 3.5.10-3.5.11 and Firefox 4.0 Beta1"
confirm http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
misc
secunia 42867
vupen ADV-2011-0061
Last major update 19-09-2017 - 01:31
Published 15-09-2010 - 20:00
Back to Top