Mozilla Firefox for Android < 37.0 DNS Cache Poisoning

medium Nessus Network Monitor Plugin ID 8746
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Android host was detected using an outdated version of Mozilla Firefox which is vulnerable to DNS cache poisoning attacks.

Description

Versions of Mozilla Firefox for Android earlier than 37.0 are affected by a flaw in 'android/res_init.c' within the Fennec name resolver that is due to insufficient entropy in the pseudo-random number generator (PRNG). This may allow a context-dependent attacker to conduct a DNS cache poisoning attack.

Solution

Upgrade to Mozilla Firefox 37.0 or later from the Google Play app store.

See Also

http://www.mozilla.org/security/announce

https://bugzilla.mozilla.org/show_bug.cgi?id=1110212

http://blog.watchfire.com/files/androiddnsweakprng.pdf

https://www.mozilla.org/en-US/security/advisories/mfsa2015-41

Plugin Details

Severity: Medium

ID: 8746

Published: 4/30/2015

Updated: 3/6/2019

Dependencies: 6534

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:mozilla:firefox_mobile:*:*:*:*:*:*:*:*

Patch Publication Date: 3/31/2015

Vulnerability Publication Date: 3/31/2015

Reference Information

CVE: CVE-2015-0800, CVE-2012-2808

BID: 73459