cve/2008/CVE-2008-5913.md

18 lines
949 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2008-5913](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5913)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
### POC
#### Reference
- http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161
#### Github
No PoCs found on GitHub currently.