The js_InitRandom function in the JavaScript implementation in Mozilla Firefox 3.5.10 through 3.5.11, 3.6.4 through 3.6.8, and 4.0 Beta1 uses a context pointer in conjunction with its successor pointer for seeding of a random number generator, which makes it easier for remote attackers to guess the seed value via a brute-force attack, a different vulnerability than CVE-2010-3171.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | 3.5.10 (including) | 3.5.10 (including) |
Firefox | Mozilla | 3.5.11 (including) | 3.5.11 (including) |
Firefox | Mozilla | 3.6.4 (including) | 3.6.4 (including) |
Firefox | Mozilla | 3.6.6 (including) | 3.6.6 (including) |
Firefox | Mozilla | 3.6.7 (including) | 3.6.7 (including) |
Firefox | Mozilla | 3.6.8 (including) | 3.6.8 (including) |
Firefox | Mozilla | 4.0-beta1 (including) | 4.0-beta1 (including) |
Firefox | Ubuntu | dapper | * |
Firefox | Ubuntu | hardy | * |
Firefox-3.0 | Ubuntu | jaunty | * |
Firefox-3.5 | Ubuntu | jaunty | * |
Seamonkey | Ubuntu | jaunty | * |
Thunderbird | Ubuntu | hardy | * |
Thunderbird | Ubuntu | jaunty | * |
Thunderbird | Ubuntu | karmic | * |
Xulrunner-1.9.2 | Ubuntu | jaunty | * |