CVE-2014-1516
The saltProfileName function in base/GeckoProfileDirectories.java in Mozilla Firefox through 28.0.1 on Android relies on Android's weak approach to seeding the Math.random function, which makes it easier for attackers to bypass a profile-randomization protection mechanism via a crafted application.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0015 (0.2%)
Percentile: 35.2%
EPSS: 2026-05-06
Affects
mozilla:firefoxgoogle:androidTechnical description
The saltProfileName function in base/GeckoProfileDirectories.java in Mozilla Firefox through 28.0.1 on Android relies on Android's weak approach to seeding the Math.random function, which makes it easier for attackers to bypass a profile-randomization protection mechanism via a crafted application.
Published: 3/29/2014, 8:55:04 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://archives.neohapsis.com/archives/bugtraq/2014-03/0153.html
- http://securityintelligence.com/vulnerabilities-firefox-android-overtaking-firefox-profiles/
- http://www.slideshare.net/ibmsecurity/overtaking-firefox-profiles-vulnerabilities-in-firefox-for-android
- http://archives.neohapsis.com/archives/bugtraq/2014-03/0153.html
- http://securityintelligence.com/vulnerabilities-firefox-android-overtaking-firefox-profiles/
- http://www.slideshare.net/ibmsecurity/overtaking-firefox-profiles-vulnerabilities-in-firefox-for-android