The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a random number generator that is seeded only once per document object, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a temporary footprint and an in-session phishing attack. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-5913.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | 3.5.10 (including) | 3.5.10 (including) |
Firefox | Mozilla | 3.5.11 (including) | 3.5.11 (including) |
Firefox | Mozilla | 3.6.4 (including) | 3.6.4 (including) |
Firefox | Mozilla | 3.6.6 (including) | 3.6.6 (including) |
Firefox | Mozilla | 3.6.7 (including) | 3.6.7 (including) |
Firefox | Mozilla | 3.6.8 (including) | 3.6.8 (including) |
Firefox | Mozilla | 4.0-beta1 (including) | 4.0-beta1 (including) |
Firefox | Ubuntu | dapper | * |
Firefox | Ubuntu | hardy | * |
Firefox-3.0 | Ubuntu | jaunty | * |
Firefox-3.5 | Ubuntu | jaunty | * |
Seamonkey | Ubuntu | jaunty | * |
Thunderbird | Ubuntu | hardy | * |
Thunderbird | Ubuntu | jaunty | * |
Thunderbird | Ubuntu | karmic | * |
Xulrunner-1.9.2 | Ubuntu | jaunty | * |