CVE-2008-5913

CVE Details

Release Date:2009-01-20

Description


The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a temporary footprint and an in-session phishing attack.

See more information about CVE-2008-5913 from MITRE CVE dictionary and NIST NVD


CVSS v2.0 metrics


NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 4.9 Base Metrics: AV:N/AC:M/Au:S/C:P/I:P/A:N
Access Vector: Network Attack Complexity: Medium
Authentication: Requires single instance Confidentiality Impact: Partial
Integrity Impact: Partial Availability Impact: None

Errata information


PlatformErrataRelease Date
Oracle Enterprise Linux version 4 (firefox)ELSA-2010-05002010-06-23
Oracle Linux version 5 (devhelp)ELSA-2010-05012010-06-23
Oracle Linux version 5 (esc)ELSA-2010-05012010-06-23
Oracle Linux version 5 (firefox)ELSA-2010-05012010-06-23
Oracle Linux version 5 (gnome-python2-extras)ELSA-2010-05012010-06-23
Oracle Linux version 5 (totem)ELSA-2010-05012010-06-23
Oracle Linux version 5 (xulrunner)ELSA-2010-05012010-06-23
Oracle Linux version 5 (yelp)ELSA-2010-05012010-06-23



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete