Computer Security
[EN] securityvulns.ru no-pyccku


Mozilla Firefox weak PRNG generator
Published:05.02.2007
Source:
SecurityVulns ID:7180
Type:client
Threat Level:
5/10
Description:Weak PRNG generator is used to generate temporary files names for XMLHttpRequest. It may be used to access content of local files by creating temporary HTML file with predictable name.
Affected:MOZILLA : Firefox 1.5
CVE:CVE-2007-0801 (The nsExternalAppHandler::SetUpTempFile function in Mozilla Firefox 1.5.0.9 creates temporary files with predictable filenames based on creation time, which allows remote attackers to execute arbitrary web script or HTML via a crafted XMLHttpRequest.)
 CVE-2007-0800 (Cross-zone vulnerability in Mozilla Firefox 1.5.0.9 considers blocked popups to have an internal zone origin, which allows user-assisted remote attackers to cross zone restrictions and read arbitrary file:// URIs by convincing a user to show a blocked popup.)
Original documentdocumentMichal Zalewski, [Full-disclosure] Firefox + popup blocker + XMLHttpRequest + srand() = oops (05.02.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod