Lucene search

K
cve[email protected]CVE-2010-3171
HistorySep 15, 2010 - 8:00 p.m.

CVE-2010-3171

2010-09-1520:00:00
CWE-310
web.nvd.nist.gov
38
cve-2010-3171
javascript
math.random
mozilla firefox
remote attack
spoofed pop-up
phishing attack

9.2 High

AI Score

Confidence

High

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.021 Low

EPSS

Percentile

88.9%

The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a β€œtemporary footprint” and an β€œin-session phishing attack.” NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-5913.

9.2 High

AI Score

Confidence

High

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.021 Low

EPSS

Percentile

88.9%