CVE-2015-0800

The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2012-2808.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:23

Type Values Removed Values Added
References () http://www.mozilla.org/security/announce/2015/mfsa2015-41.html - Vendor Advisory () http://www.mozilla.org/security/announce/2015/mfsa2015-41.html - Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -
References () http://www.securitytracker.com/id/1031996 - () http://www.securitytracker.com/id/1031996 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1110212 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1110212 -

Information

Published : 2015-04-01 10:59

Updated : 2024-11-21 02:23


NVD link : CVE-2015-0800

Mitre link : CVE-2015-0800

CVE.ORG link : CVE-2015-0800


JSON object : View

Products Affected

google

  • android

mozilla

  • firefox
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor