Lucene search

K
mozillaMozilla FoundationMFSA2015-41
HistoryMar 31, 2015 - 12:00 a.m.

PRNG weakness allows for DNS poisoning on Android — Mozilla

2015-03-3100:00:00
Mozilla Foundation
www.mozilla.org
25

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

70.5%

Mozilla developer Daniel Stenberg reported that the DNS resolver in Firefox for Android uses an insufficiently random algorithm when generating random numbers for the unique identifier. This was derived from an old version of the Bionic libc library and suffered from insufficient randomness in the pseudo-random number generator (PRNG) as described by Roee Hay and Roi Saltzman.

Affected configurations

Vulners
Node
mozillafirefoxRange<37
CPENameOperatorVersion
firefoxlt37

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

70.5%