Описание
The saltProfileName function in base/GeckoProfileDirectories.java in Mozilla Firefox through 28.0.1 on Android relies on Android's weak approach to seeding the Math.random function, which makes it easier for attackers to bypass a profile-randomization protection mechanism via a crafted application.
The saltProfileName function in base/GeckoProfileDirectories.java in Mozilla Firefox through 28.0.1 on Android relies on Android's weak approach to seeding the Math.random function, which makes it easier for attackers to bypass a profile-randomization protection mechanism via a crafted application.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-1516
- http://archives.neohapsis.com/archives/bugtraq/2014-03/0153.html
- http://securityintelligence.com/vulnerabilities-firefox-android-overtaking-firefox-profiles
- http://www.slideshare.net/ibmsecurity/overtaking-firefox-profiles-vulnerabilities-in-firefox-for-android
EPSS
CVE ID
Связанные уязвимости
The saltProfileName function in base/GeckoProfileDirectories.java in Mozilla Firefox through 28.0.1 on Android relies on Android's weak approach to seeding the Math.random function, which makes it easier for attackers to bypass a profile-randomization protection mechanism via a crafted application.
The saltProfileName function in base/GeckoProfileDirectories.java in M ...
EPSS