Vulnerability Name: CVE-2008-5915 (CCN-48173) Assigned: 2008-01-29 Published: 2008-01-29 Updated: 2021-11-15 Summary: An unspecified function in the JavaScript implementation in Google Chrome creates and exposes a "temporary footprint" when there is a current login to a web site, which makes it easier for remote attackers to trick a user into acting upon a spoofed pop-up message, aka an "in-session phishing attack."Note : as of 20090116, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. CVSS v3 Severity: 4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): None
CVSS v2 Severity: 2.1 Low (CVSS v2 Vector: AV:N/AC:H/Au:S/C:N/I:P/A:N )1.6 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:S/C:N/I:P/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAuthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N )3.0 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): None
Vulnerability Type: CWE-noinfo Vulnerability Consequences: Other References: Source: CCN Type: ars technica Web siteNew in-session phishing attack could fool experienced users Source: MISC Type: Third Party Advisoryhttp://arstechnica.com/news.ars/post/20090113-new-method-of-phishmongering-could-fool-experienced-users.html Source: MITRE Type: CNACVE-2008-5912 Source: MITRE Type: CNACVE-2008-5913 Source: MITRE Type: CNACVE-2008-5914 Source: MITRE Type: CNACVE-2008-5915 Source: CCN Type: RHSA-2010-0500Critical: firefox security, bug fix, and enhancement update Source: CCN Type: RHSA-2010-0501Critical: firefox security, bug fix, and enhancement update Source: CCN Type: SA40309Mozilla Firefox Multiple Vulnerabilities Source: CCN Type: SA40326Mozilla SeaMonkey Multiple Vulnerabilities Source: CCN Type: Apple Web siteSafari Source: CCN Type: darkREADING Web siteNew Phishing Attack Targets Online Banking Sessions With Phony Popups Source: MISC Type: Third Party Advisoryhttp://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=212900161 Source: CCN Type: Google Chrome Web site Google Chrome Source: CCN Type: InfoWorld Web siteBrowser bug could allow phishing without e-mail Source: MISC Type: Broken Linkhttp://www.infoworld.com/article/09/01/13/Browser_bug_could_allow_phishing_without_email_1.html Source: CCN Type: Microsoft Internet Explorer Web siteInternet Explorer Source: CCN Type: Mozilla Firefox Web siteFirefox web browser | Faster, more secure, & customizable Source: CCN Type: MFSA 2010-33User tracking across sites using Math.random() Source: CCN Type: OSVDB ID: 53340Microsoft IE JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness Source: CCN Type: OSVDB ID: 53341Mozilla Firefox JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness Source: CCN Type: OSVDB ID: 53342Apple Safari JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness Source: CCN Type: OSVDB ID: 53343Google Chrome JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness Source: CCN Type: OSVDB ID: 68048Mozilla Multiple Products JavaScript Implementation js_InitRandom Function Multiple Pointer RNG Seeding Weakness Source: BID Type: Third Party Advisory, VDB Entry33276 Source: CCN Type: BID-33276Multiple Browser JavaScript Engine 'Math.Random()' Cross Domain Information Disclosure Vulnerability Source: CCN Type: BID-41050RETIRED: Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2010-26/27/28/29/30/32 Remote Vulnerabilities Source: CCN Type: Trusteer Web siteIn Session Phishing Attacks Source: MISC Type: Third Party Advisoryhttp://www.trusteer.com/files/In-session-phishing-advisory-2.pdf Source: XF Type: UNKNOWNmultiple-browser-js-weak-security(48173) Source: SUSE Type: SUSE-SA:2010:030Mozilla Firefox security update Vulnerable Configuration: Configuration 1 :cpe:/a:google:chrome:-:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:microsoft:ie:*:*:*:*:*:*:*:* OR cpe:/a:apple:safari:*:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1::beta:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::alpha:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:* OR cpe:/a:google:chrome:*:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.1::alpha:*:*:*:*:* OR cpe:/a:mozilla:firefox:3.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:3.5.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:3.5.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:3.5.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:3.5.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::beta:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::dev:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:3.5.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:2.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:3.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:11.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:* OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:* OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:* OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
google chrome -
microsoft ie *
apple safari *
mozilla firefox *
mozilla seamonkey 1.0.5
mozilla seamonkey 1.0.7
mozilla seamonkey 1.0.2
mozilla seamonkey 1.1.3
mozilla seamonkey 1.1.2
mozilla seamonkey 1.1.1
mozilla seamonkey 1.1.4
mozilla seamonkey 1.1.5
mozilla seamonkey 1.1.6
mozilla seamonkey 1.0
mozilla seamonkey 1.0.1
mozilla seamonkey 1.0.3
mozilla seamonkey 1.0.4
mozilla seamonkey 1.0.6
mozilla seamonkey 1.0.8
mozilla seamonkey 1.0.9
mozilla seamonkey 1.1
mozilla seamonkey 1.1.7
mozilla seamonkey 1.1.8
mozilla seamonkey 1.1.9
mozilla seamonkey 1.1
mozilla seamonkey 1.0
mozilla seamonkey 1.1.10
mozilla seamonkey 1.1.11
mozilla seamonkey 1.1.12
mozilla seamonkey 1.1.13
google chrome *
mozilla seamonkey 1.1.14
mozilla seamonkey 1.1.15
mozilla seamonkey 1.1
mozilla firefox 3.5
mozilla firefox 3.5.1
mozilla firefox 3.5.2
mozilla firefox 3.5.3
mozilla firefox 3.5.4
mozilla seamonkey 1.0
mozilla seamonkey 1.0
mozilla seamonkey 1.0.99
mozilla seamonkey 1.5.0.8
mozilla seamonkey 1.5.0.9
mozilla seamonkey 1.5.0.10
mozilla firefox 3.5.5
mozilla seamonkey 2.0
mozilla seamonkey 2.0.1
mozilla seamonkey 2.0.2
mozilla firefox 3.6
mozilla seamonkey 2.0.3
mozilla seamonkey 2.0.4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
novell suse linux enterprise server 10 sp2
redhat enterprise linux 5
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
redhat enterprise linux 5
mandrakesoft mandrake linux 2008.0
novell opensuse 11.0
mandriva linux 2009.0
mandriva linux 2009.0 -
mandriva linux 2009.1
mandriva linux 2009.1
mandriva enterprise server 5
mandriva enterprise server 5
mandriva linux 2010
mandriva linux 2010