Advertisement






Google Chrome 3.0 (Beta) Math.random vulnerability

CVE Category Price Severity
CVE-2008-1234 CWE-123 $500 High
Author Risk Exploitation Type Date
Exploit Author Critical Remote 2009-09-04
CVSS EPSS EPSSP
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2009090002

Below is a copy:

I would like to announce a new writeup, titled "Google Chrome 3.0 (Beta) Math.random vulnerability". The writeup is available in the following URL:

http://www.trusteer.com/files/Google_Chrome_3.0_Beta_Math.random_vulnerability.pdf

Abstract:
The revised Google Chrome Math.random algorithm (included in version 3.0 of Google Chrome) is predictable. This paper describes how Google Chrome 3.0 Math.random's internal state can be reconstructed, and how it can be rolled forward and backward, and how (in Windows) the exact seeding time can be extracted. This in turn leads to various attacks
(e.g. "in-session phishing") as described in an earlier paper
(http://www.trusteer.com/files/Temporary_User_Tracking_in_Major_Browsers.pdf).

Thanks,
-Amit 

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum