Lucene search

K
openvasCopyright (C) 2010 Greenbone AGOPENVAS:1361412562310902305
HistorySep 21, 2010 - 12:00 a.m.

Mozilla Firefox Information Disclosure Vulnerability - Windows

2010-09-2100:00:00
Copyright (C) 2010 Greenbone AG
plugins.openvas.org
10

9.1 High

AI Score

Confidence

High

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.021 Low

EPSS

Percentile

88.9%

Mozilla Firefox is prone to an information disclosure vulnerability.

# SPDX-FileCopyrightText: 2010 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.902305");
  script_version("2024-02-15T05:05:39+0000");
  script_tag(name:"last_modification", value:"2024-02-15 05:05:39 +0000 (Thu, 15 Feb 2024)");
  script_tag(name:"creation_date", value:"2010-09-21 16:43:08 +0200 (Tue, 21 Sep 2010)");
  script_cve_id("CVE-2010-3171", "CVE-2010-3399");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:N");
  script_name("Mozilla Firefox Information Disclosure Vulnerability - Windows");
  script_xref(name:"URL", value:"http://archives.neohapsis.com/archives/bugtraq/2010-09/0117.html");
  script_xref(name:"URL", value:"http://www.trusteer.com/sites/default/files/Cross_domain_Math_Random_leakage_in_FF_3.6.4-3.6.8.pdf");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2010 Greenbone AG");
  script_family("General");
  script_dependencies("gb_firefox_detect_portable_win.nasl");
  script_mandatory_keys("Firefox/Win/Ver");

  script_tag(name:"impact", value:"Successful exploitation will let attackers to bypass the same-origin policy
  and obtain potentially sensitive information. Other attacks are possible.");

  script_tag(name:"affected", value:"Firefox version 3.5.10 through 3.5.11

  Firefox version 3.6.4 through 3.6.8 and 4.0 Beta1");

  script_tag(name:"insight", value:"The flaws are due to:

  - Error in 'Math.random' function in the JavaScript implementation which uses
  a random number generator that is seeded only once per document object, which
  makes it easier for remote attackers to track a user, or trick a user into
  acting upon a spoofed pop-up message, by calculating the seed value.

  - Error in 'js_InitRandom' function in the JavaScript implementation uses a
  context pointer in conjunction with its successor pointer for seeding of a
  random number generator, which makes it easier for remote attackers to guess
  the seed value via a brute-force attack.");

  script_tag(name:"solution", value:"Upgrade to Mozilla Firefox version 3.6.9 or later, 3.5.12 or later, 4.0 Beta-2 or later.");

  script_tag(name:"summary", value:"Mozilla Firefox is prone to an information disclosure vulnerability.");

  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"VendorFix");



  exit(0);
}

include("version_func.inc");

ffVer = get_kb_item("Firefox/Win/Ver");
if(ffVer)
{
  if(version_in_range(version:ffVer, test_version:"3.5.10", test_version2:"3.5.11")||
     version_in_range(version:ffVer, test_version:"3.6.4", test_version2:"3.6.8")||
     version_is_equal(version:ffVer, test_version:"4.0.b1")){
     security_message( port: 0, data: "The target host was found to be vulnerable" );
  }
}

9.1 High

AI Score

Confidence

High

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.021 Low

EPSS

Percentile

88.9%