CVE-2009-2477

js/src/jstracer.cpp in the Just-in-time (JIT) JavaScript compiler (aka TraceMonkey) in Mozilla Firefox 3.5 before 3.5.1 allows remote attackers to execute arbitrary code via certain use of the escape function that triggers access to uninitialized memory locations, as originally demonstrated by a document containing P and FONT elements.
References
Link Resource
http://blog.mozilla.com/security/2009/07/14/critical-javascript-vulnerability-in-firefox-35/
http://isc.sans.org/diary.html?storyid=6796
http://secunia.com/advisories/35798 Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1
http://voices.washingtonpost.com/securityfix/2009/07/stopgap_fix_for_critical_firef.html
http://www.exploit-db.com/exploits/9137
http://www.exploit-db.com/exploits/9181
http://www.h-online.com/security/First-Zero-Day-Exploit-for-Firefox-3-5--/news/113761
http://www.kb.cert.org/vuls/id/443060 US Government Resource
http://www.mozilla.org/security/announce/2009/mfsa2009-41.html Patch Vendor Advisory
http://www.securityfocus.com/bid/35660 Exploit
http://www.vupen.com/english/advisories/2009/1868 Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=503286
https://www.exploit-db.com/exploits/40936/
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00909.html
http://blog.mozilla.com/security/2009/07/14/critical-javascript-vulnerability-in-firefox-35/
http://isc.sans.org/diary.html?storyid=6796
http://secunia.com/advisories/35798 Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1
http://voices.washingtonpost.com/securityfix/2009/07/stopgap_fix_for_critical_firef.html
http://www.exploit-db.com/exploits/9137
http://www.exploit-db.com/exploits/9181
http://www.h-online.com/security/First-Zero-Day-Exploit-for-Firefox-3-5--/news/113761
http://www.kb.cert.org/vuls/id/443060 US Government Resource
http://www.mozilla.org/security/announce/2009/mfsa2009-41.html Patch Vendor Advisory
http://www.securityfocus.com/bid/35660 Exploit
http://www.vupen.com/english/advisories/2009/1868 Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=503286
https://www.exploit-db.com/exploits/40936/
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00909.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:04

Type Values Removed Values Added
References () http://blog.mozilla.com/security/2009/07/14/critical-javascript-vulnerability-in-firefox-35/ - () http://blog.mozilla.com/security/2009/07/14/critical-javascript-vulnerability-in-firefox-35/ -
References () http://isc.sans.org/diary.html?storyid=6796 - () http://isc.sans.org/diary.html?storyid=6796 -
References () http://secunia.com/advisories/35798 - Vendor Advisory () http://secunia.com/advisories/35798 - Vendor Advisory
References () http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1 -
References () http://voices.washingtonpost.com/securityfix/2009/07/stopgap_fix_for_critical_firef.html - () http://voices.washingtonpost.com/securityfix/2009/07/stopgap_fix_for_critical_firef.html -
References () http://www.exploit-db.com/exploits/9137 - () http://www.exploit-db.com/exploits/9137 -
References () http://www.exploit-db.com/exploits/9181 - () http://www.exploit-db.com/exploits/9181 -
References () http://www.h-online.com/security/First-Zero-Day-Exploit-for-Firefox-3-5--/news/113761 - () http://www.h-online.com/security/First-Zero-Day-Exploit-for-Firefox-3-5--/news/113761 -
References () http://www.kb.cert.org/vuls/id/443060 - US Government Resource () http://www.kb.cert.org/vuls/id/443060 - US Government Resource
References () http://www.mozilla.org/security/announce/2009/mfsa2009-41.html - Patch, Vendor Advisory () http://www.mozilla.org/security/announce/2009/mfsa2009-41.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/35660 - Exploit () http://www.securityfocus.com/bid/35660 - Exploit
References () http://www.vupen.com/english/advisories/2009/1868 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/1868 - Patch, Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=503286 - () https://bugzilla.mozilla.org/show_bug.cgi?id=503286 -
References () https://www.exploit-db.com/exploits/40936/ - () https://www.exploit-db.com/exploits/40936/ -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00909.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00909.html -

Information

Published : 2009-07-15 15:30

Updated : 2024-11-21 01:04


NVD link : CVE-2009-2477

Mitre link : CVE-2009-2477

CVE.ORG link : CVE-2009-2477


JSON object : View

Products Affected

mozilla

  • firefox
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')