5.8
CVSSv2

CVE-2010-3171

Published: 15/09/2010 Updated: 19/09/2017
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 585
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 up to and including 3.5.11, 3.6.4 up to and including 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote malicious users to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack." NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-5913.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 3.6.4

mozilla firefox 4.0

mozilla firefox 3.6.7

mozilla firefox 3.6.6

mozilla firefox 3.5.11

mozilla firefox 3.6.8

mozilla firefox 3.5.10

Vendor Advisories

Mozilla Foundation Security Advisory 2010-33 User tracking across sites using Mathrandom() Announced June 22, 2010 Reporter Amit Klein Impact Low Products Firefox, SeaMonkey Fixed in ...

Exploits

source: wwwsecurityfocuscom/bid/43222/info Mozilla Firefox is prone to a cross-domain information-disclosure vulnerability An attacker can exploit this issue by tricking an unsuspecting victim into viewing a page containing malicious content Successful exploits will allow attackers to bypass the same-origin policy and obtain potential ...