CVE-2014-1516
The saltProfileName function in base/GeckoProfileDirectories.java in Mozilla Firefox through 28.0.1 on Android relies on Android's weak approach to seeding the Math.random function, which makes it easier for attackers to bypass a profile-randomization protection mechanism via a crafted application.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0015 (0.2%)
Percentil: 35.2%
EPSS: 2026-05-06
Afecta
mozilla:firefoxgoogle:androidDescripción técnica
The saltProfileName function in base/GeckoProfileDirectories.java in Mozilla Firefox through 28.0.1 on Android relies on Android's weak approach to seeding the Math.random function, which makes it easier for attackers to bypass a profile-randomization protection mechanism via a crafted application.
Publicada: 29/3/2014, 20:55:04
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://archives.neohapsis.com/archives/bugtraq/2014-03/0153.html
- http://securityintelligence.com/vulnerabilities-firefox-android-overtaking-firefox-profiles/
- http://www.slideshare.net/ibmsecurity/overtaking-firefox-profiles-vulnerabilities-in-firefox-for-android
- http://archives.neohapsis.com/archives/bugtraq/2014-03/0153.html
- http://securityintelligence.com/vulnerabilities-firefox-android-overtaking-firefox-profiles/
- http://www.slideshare.net/ibmsecurity/overtaking-firefox-profiles-vulnerabilities-in-firefox-for-android