The js_InitRandom function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses the current time for seeding of a random number generator, which makes it easier for remote attackers to guess the seed value via a brute-force attack, a different vulnerability than CVE-2008-5913.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | 3.5 (including) | 3.5 (including) |
Firefox | Mozilla | 3.5.1 (including) | 3.5.1 (including) |
Firefox | Mozilla | 3.5.2 (including) | 3.5.2 (including) |
Firefox | Mozilla | 3.5.3 (including) | 3.5.3 (including) |
Firefox | Mozilla | 3.5.4 (including) | 3.5.4 (including) |
Firefox | Mozilla | 3.5.5 (including) | 3.5.5 (including) |
Firefox | Mozilla | 3.5.6 (including) | 3.5.6 (including) |
Firefox | Mozilla | 3.5.7 (including) | 3.5.7 (including) |
Firefox | Mozilla | 3.5.8 (including) | 3.5.8 (including) |
Firefox | Mozilla | 3.5.9 (including) | 3.5.9 (including) |
Firefox | Ubuntu | dapper | * |
Firefox | Ubuntu | hardy | * |
Firefox-3.0 | Ubuntu | jaunty | * |
Firefox-3.5 | Ubuntu | jaunty | * |
Seamonkey | Ubuntu | jaunty | * |
Thunderbird | Ubuntu | hardy | * |
Thunderbird | Ubuntu | jaunty | * |
Thunderbird | Ubuntu | karmic | * |
Xulrunner-1.9.2 | Ubuntu | jaunty | * |