Search for vulnerabilities
Vulnerability details: VCID-pnww-e1wp-aaaf
Vulnerability ID VCID-pnww-e1wp-aaaf
Aliases CVE-2009-2477
Summary js/src/jstracer.cpp in the Just-in-time (JIT) JavaScript compiler (aka TraceMonkey) in Mozilla Firefox 3.5 before 3.5.1 allows remote attackers to execute arbitrary code via certain use of the escape function that triggers access to uninitialized memory locations, as originally demonstrated by a document containing P and FONT elements.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.83034 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.84331 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.96632 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.96641 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.97020 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.97059 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.97059 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.97059 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.97059 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
epss 0.97059 https://api.first.org/data/v1/epss?cve=CVE-2009-2477
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=511228
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2009-2477
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2009-41
Reference id Reference type URL
http://blog.mozilla.com/security/2009/07/14/critical-javascript-vulnerability-in-firefox-35/
http://isc.sans.org/diary.html?storyid=6796
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2477.json
https://api.first.org/data/v1/epss?cve=CVE-2009-2477
https://bugzilla.mozilla.org/show_bug.cgi?id=503286
http://secunia.com/advisories/35798
http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1
https://www.exploit-db.com/exploits/40936/
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00909.html
http://voices.washingtonpost.com/securityfix/2009/07/stopgap_fix_for_critical_firef.html
http://www.exploit-db.com/exploits/9137
http://www.exploit-db.com/exploits/9181
http://www.h-online.com/security/First-Zero-Day-Exploit-for-Firefox-3-5--/news/113761
http://www.kb.cert.org/vuls/id/443060
http://www.mozilla.org/security/announce/2009/mfsa2009-41.html
http://www.securityfocus.com/bid/35660
http://www.vupen.com/english/advisories/2009/1868
511228 https://bugzilla.redhat.com/show_bug.cgi?id=511228
cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
CVE-2009-2477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2477
CVE-2009-2477 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40936.html
CVE-2009-2477 https://nvd.nist.gov/vuln/detail/CVE-2009-2477
CVE-2009-2477 Exploit https://www.myhackerhouse.com/naenara-browser-3-5-exploit-jackrabbit/
CVE-2009-2477;OSVDB-55846 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16299.rb
CVE-2009-2477;OSVDB-55846 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/9214.pl
GLSA-201301-01 https://security.gentoo.org/glsa/201301-01
mfsa2009-41 https://www.mozilla.org/en-US/security/advisories/mfsa2009-41
OSVDB-55932;CVE-2009-2478;OSVDB-55846;CVE-2009-2477 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/9137.html
Data source Metasploit
Description This module exploits a memory corruption vulnerability in the Mozilla Firefox browser. This flaw occurs when a bug in the javascript interpreter fails to preserve the return value of the escape() function and results in uninitialized memory being used instead. This module has only been tested on Windows, but should work on other platforms as well with the current targets.
Note
{}
Ransomware campaign use Unknown
Source publication date July 13, 2009
Platform OSX,Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/firefox_escape_retval.rb
Data source Exploit-DB
Date added July 12, 2009
Description Mozilla Firefox 3.5 - Font tags Remote Buffer Overflow
Ransomware campaign use Known
Source publication date July 13, 2009
Exploit type remote
Platform windows
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2009-2477
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.99202
EPSS Score 0.83034
Published At June 2, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.