Bugzilla 2.14 through 2.22.7; 3.0.x, 3.1.x, and 3.2.x before 3.2.10; 3.4.x before 3.4.10; 3.6.x before 3.6.4; and 4.0.x before 4.0rc2 does not properly generate random values for cookies and tokens, which allows remote attackers to obtain access to arbitrary accounts via unspecified vectors, related to an insufficient number of calls to the srand function.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/45982 | vdb entry |
http://secunia.com/advisories/43165 | third party advisory |
http://osvdb.org/70700 | vdb entry |
http://www.bugzilla.org/security/3.2.9/ | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html | vendor advisory |
http://www.vupen.com/english/advisories/2011/0271 | vdb entry |
https://bugzilla.mozilla.org/attachment.cgi?id=506031&action=diff | |
http://secunia.com/advisories/43033 | third party advisory vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=621591 | |
http://www.vupen.com/english/advisories/2011/0207 | vdb entry vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html | vendor advisory |
http://www.debian.org/security/2011/dsa-2322 | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=619594 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65001 | vdb entry |