fkie_cve-2010-4568
Vulnerability from fkie_nvd
Published
2011-01-28 16:00
Modified
2025-04-11 00:51
Severity ?
Summary
Bugzilla 2.14 through 2.22.7; 3.0.x, 3.1.x, and 3.2.x before 3.2.10; 3.4.x before 3.4.10; 3.6.x before 3.6.4; and 4.0.x before 4.0rc2 does not properly generate random values for cookies and tokens, which allows remote attackers to obtain access to arbitrary accounts via unspecified vectors, related to an insufficient number of calls to the srand function.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*", "matchCriteriaId": "1883A98C-E595-4F3C-87BF-A63393F9F561", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD49E53A-5676-4FAC-A8A2-30FAC04C33D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "1084AF8E-5269-4EFF-BBD2-C5A77945FCF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "D9A4B035-B73E-48E9-BBB9-83219F5D2A95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "9452C271-2812-4775-8396-394C642EACFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D351AF2-C0AB-4BB3-8692-677A3025A615", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F16D338E-C5BC-46E1-95DD-D9B0E25EE56E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "5877CECA-F758-4F48-B4F4-2C4C1DF01FA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*", "matchCriteriaId": "D63CE086-5872-4594-8F4B-8D812E7EF09C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "B900D9A7-913A-4176-90CF-C7C3B09A4261", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "B692910E-633D-4A88-B245-56A2B58DD4CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "F86EE5DB-442B-4C78-8152-AF1048C6A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*", "matchCriteriaId": "19B82A1A-56EB-41D5-8619-2A717E3A6ECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*", "matchCriteriaId": "83A0406C-AAF2-4A4C-9567-E21DF1B6C46E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*", "matchCriteriaId": "64434BFC-DDC0-4C7D-B578-472B0610C89E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*", "matchCriteriaId": "A30F28D9-B000-4C26-A911-5E1B8A867BF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*", "matchCriteriaId": "4A123F78-A671-4FB5-AE78-83762E9323C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*", "matchCriteriaId": "28C34288-A326-4B71-99B0-DA9FFD28160F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*", "matchCriteriaId": "73648879-BB08-4BE4-A7FF-1E8DF4E264B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*", "matchCriteriaId": "9B2FC5C7-B218-4B87-9805-F90AC0E7A281", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBCDA64F-C49A-4F5B-B285-4079D8E3A499", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "85ED3457-CC21-4DB3-931F-677F723E1B2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C8711D3-55CF-4131-BBAC-6BE07068219F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*", "matchCriteriaId": "DF54FFA5-5177-46E6-9AFA-BA3345C16E8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*", "matchCriteriaId": "69D7EA7C-B401-4F5A-AC08-2199DD117403", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*", "matchCriteriaId": "DC2DDC7C-CD2B-4597-A5E0-266A884958FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*", "matchCriteriaId": "DDB99B2D-CA05-4BC0-BCA4-9B94DF248333", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*", "matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*", "matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*", "matchCriteriaId": "EAC72143-27C3-498F-AFAB-98AE043C0545", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*", "matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*", "matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*", "matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*", "matchCriteriaId": "C535BAB7-6146-440B-ADBD-51007585CFC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*", "matchCriteriaId": "7B6BA7E8-DEC7-4D94-B9F9-B70EC39FD892", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6\\+:*:*:*:*:*:*:*", "matchCriteriaId": "15E6F17A-7292-4640-A5E6-59865D1CDD7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*", "matchCriteriaId": "725BD7BE-1769-4032-ADA8-9ED15528C770", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "239D70F4-7D86-4A57-ACEF-440F68994FB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "ABEE2C94-DA69-4A78-A15F-538383A7460E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*", "matchCriteriaId": "A749C7AB-6F60-469C-BD95-759205DDA345", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*", "matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEA9DE63-9951-4FE0-80BE-0F6F197303D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "B0CEDD02-1CB8-4D5B-B82B-E300B4E39065", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "8E27101B-7985-4412-A14F-9ED11E4C874C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*", "matchCriteriaId": "8A74E8A2-223E-4877-989E-494362B513E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*", "matchCriteriaId": "E0CAFB45-B115-4492-9919-60223304BB27", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*", "matchCriteriaId": "DC3F7C44-C734-419B-AB62-3AD52554FC7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*", "matchCriteriaId": "695036D1-994C-451E-8D53-0A345702E4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*", "matchCriteriaId": "2053CFB4-602E-4141-BB3D-A440E2A31D85", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "31ACBA13-AC13-4469-862F-B3DD2327B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E9EC243-3E25-4234-A88A-FDD5B594BFBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*", "matchCriteriaId": "F2969731-8256-431B-9356-4BC873D98F6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*", "matchCriteriaId": "1C166E42-9B36-4883-B738-EEBEF3056D98", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "E5177876-0FEC-481B-815F-84AF53968644", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "BC38566A-07F1-4F21-BAC1-259F844DC15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*", "matchCriteriaId": "AE1684B8-3060-4139-BC06-707F27A05958", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*", "matchCriteriaId": "FF32C74C-3EA3-4E1F-BADA-BB4A92068266", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*", "matchCriteriaId": "D569A750-C649-4D40-89AB-D29773E66F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*", "matchCriteriaId": "95B69FA8-1182-46F1-952F-4610288ED409", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9F54A-15A7-4899-B695-D9D8B96C4A9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "BD56D9C0-38C6-4679-8104-1A0B88B71C0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "45C36666-518F-4956-816A-940930425955", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "11C6713F-01ED-4AE9-AE42-89926067E6E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AB5010D-37A3-4B6E-92B6-6F41A3708851", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EEB09719-122F-4D25-B680-18029D5D9DE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AF585D92-9FAF-4858-A956-68AF77227333", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "CB0F7531-A660-4604-80BD-15B01E2916BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A6FE6868-BB9F-4EB8-9E37-3438559CB01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "1EC90352-C94A-4F47-AFB7-713B547373CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "E5E77E01-D779-482A-9FAC-4AC210B68771", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "154EA18F-534C-4095-837D-BB9865D25F23", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "585F05F2-B294-4218-9209-C487B4D2994B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F3246890-8D66-474F-AC9C-BC556426467D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "7090332F-4CC2-4ADD-AEEC-75238BCA55CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "F960BE59-05B1-4438-A854-279612E13A7B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "170EB43B-9488-4E25-9401-B84DE838247B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "B1ED7682-A315-4F92-9F9F-38290BCC058E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "6FEC62B7-2CAA-4A0D-A9B2-B4A6B105A6F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "4B4A7A67-1355-4648-B8C9-3231BED96547", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "442AB3EE-61DF-4B25-ABEB-55905C01E376", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "7F825E34-D529-4ADC-A7D6-1BD9DAE86FC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "C1F92D0C-AF71-4FD3-BC4B-C6D0F1F84F9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "CBC26020-BFD7-493B-BDE2-1EC8DEA1A6DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "984463B4-00A8-423B-B0C5-A7C4FECF064C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "D6A71919-DC70-4AE2-9D16-76A177DAE331", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "780896D3-3B49-486F-A136-D3D175C00A34", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "EA43E47B-F474-4F5B-A91B-9AF99359FE5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A7A3A453-EE50-458C-8F31-D7AA232006FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3D920D39-683D-4F9F-AA85-3C4D1600DAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "E7A4F1FD-2B00-4A99-AAA1-DBBFE3748D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "EF6A3C0F-8778-4236-B4DC-41DBCF43EB62", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "7D134D4D-6A95-48FE-B8E5-4F90692CB4FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "08C34E6F-8233-4575-AAE7-4DBFC27453F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "6D8155F8-CAB1-4EED-B576-F4102253BD25", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "593D2F3B-A386-48D8-BF19-A12F1B4962A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "397E07B5-3D9D-44C7-B8B3-18D04EE84405", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A1AD503-7F78-4597-AECD-6DC530AD4D3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bugzilla 2.14 through 2.22.7; 3.0.x, 3.1.x, and 3.2.x before 3.2.10; 3.4.x before 3.4.10; 3.6.x before 3.6.4; and 4.0.x before 4.0rc2 does not properly generate random values for cookies and tokens, which allows remote attackers to obtain access to arbitrary accounts via unspecified vectors, related to an insufficient number of calls to the srand function." }, { "lang": "es", "value": "Bugzilla v2.14 a la v2.22.7; v3.0.x, v3.1.x, y v3.2.x anterior a v3.2.10; v3.4.x anterior a v3.4.10; v3.6.x anterior a v3.6.4; y v4.0.x anterior a v4.0rc2, no genera adecuadamente valores aleatorios para las cookies y los tokens, lo que permite a atacantes remotos obtener acceso a cuentas de su elecci\u00f3n a trav\u00e9s de vectores no especificados. Relacionado con un n\u00famero insuficiente de llamadas a la funci\u00f3n \"srand\"." } ], "id": "CVE-2010-4568", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-28T16:00:02.063", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/70700" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43033" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/43165" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.bugzilla.org/security/3.2.9/" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2322" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45982" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0207" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0271" }, { "source": "cve@mitre.org", "url": "https://bugzilla.mozilla.org/attachment.cgi?id=506031\u0026action=diff" }, { "source": "cve@mitre.org", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=619594" }, { "source": "cve@mitre.org", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=621591" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/70700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43165" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.bugzilla.org/security/3.2.9/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0207" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.mozilla.org/attachment.cgi?id=506031\u0026action=diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=619594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=621591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65001" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…