CVE-2014-1516

The saltProfileName function in base/GeckoProfileDirectories.java in Mozilla Firefox through 28.0.1 on Android relies on Android's weak approach to seeding the Math.random function, which makes it easier for attackers to bypass a profile-randomization protection mechanism via a crafted application.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2014-03/0153.html - () http://archives.neohapsis.com/archives/bugtraq/2014-03/0153.html -
References () http://securityintelligence.com/vulnerabilities-firefox-android-overtaking-firefox-profiles/ - Exploit () http://securityintelligence.com/vulnerabilities-firefox-android-overtaking-firefox-profiles/ - Exploit
References () http://www.slideshare.net/ibmsecurity/overtaking-firefox-profiles-vulnerabilities-in-firefox-for-android - Exploit () http://www.slideshare.net/ibmsecurity/overtaking-firefox-profiles-vulnerabilities-in-firefox-for-android - Exploit

Information

Published : 2014-03-29 20:55

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1516

Mitre link : CVE-2014-1516

CVE.ORG link : CVE-2014-1516


JSON object : View

Products Affected

google

  • android

mozilla

  • firefox
CWE
CWE-264

Permissions, Privileges, and Access Controls