Lucene search

K
cveMitreCVE-2010-3171
HistorySep 15, 2010 - 8:00 p.m.

CVE-2010-3171

2010-09-1520:00:02
CWE-310
mitre
web.nvd.nist.gov
48
cve-2010-3171
javascript
math.random
mozilla firefox
remote attack
spoofed pop-up
phishing attack

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

AI Score

9

Confidence

High

EPSS

0.021

Percentile

89.1%

The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a β€œtemporary footprint” and an β€œin-session phishing attack.” NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-5913.

Affected configurations

Nvd
Node
mozillafirefoxMatch3.5.10
OR
mozillafirefoxMatch3.5.11
OR
mozillafirefoxMatch3.6.4
OR
mozillafirefoxMatch3.6.6
OR
mozillafirefoxMatch3.6.7
OR
mozillafirefoxMatch3.6.8
OR
mozillafirefoxMatch4.0beta1
VendorProductVersionCPE
mozillafirefox3.5.10cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*
mozillafirefox3.5.11cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*
mozillafirefox3.6.4cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*
mozillafirefox3.6.6cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*
mozillafirefox3.6.7cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*
mozillafirefox3.6.8cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*
mozillafirefox4.0cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

AI Score

9

Confidence

High

EPSS

0.021

Percentile

89.1%