Name | CVE-2008-5913 |
Description | The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack." |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 532516, 559792 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
iceape | source | lenny | (not affected) | |||
iceape | source | (unstable) | 2.0.5-1 | unimportant | ||
xulrunner | source | (unstable) | 1.9.1.10-1 | unimportant | 532516, 559792 |
[lenny] - iceape <not-affected> (Just a stub package)
Limited to browser life time