CVE-2010-3400

CVE information

Published

11 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

The js_InitRandom function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses the current time for seeding of a random number generator, which makes it easier for remote attackers to guess the seed value via a brute-force attack, a different vulnerability than CVE-2008-5913..

CVSSv2.0 Score

Severity
Medium
Base Score
5.8/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
4.9/10
Confidentiality Impact
Partial
Availability Impact
None
Integrity Impact
Partial

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
  Yes
- -

Get started for free to scan for vulnerabilities

Companies of all sizes use Mageni Vulnerability Scanner. Is free for 7-days then $39 monthly regardless of how many IPs, scans, deployments or users you have. Cancel at Anytime and 7-days Money-Back Guarantee. Mageni contributes 1% of your subscription to removing CO₂ from the atmosphere.

Get Started For Free
App screenshot