{"vuid":"VU#443060","idnumber":"443060","name":"Mozilla Firefox 3.5 TraceMonkey JavaScript engine uninitialized memory vulnerability","keywords":["mozilla","firefox","artbitrary code"],"overview":"Mozilla Firefox's javascript engine contains a vulnerability that may allow an attacker to execute code.","clean_desc":"Mozilla Firefox version 3.5 contains a vulnerability in the TraceMonkey components of Firefox's JavaScript engine. Per Mozilla Bug Bug 503286: \"This is a JS engine bug dealing with deep bailing not properly restoring the return value from the result of the (fast native) escape function. We then try to do something with the uninitialized memory and crash in the interpreter.\" Note that proof of concept code that demonstrates issue this is publicly available.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code or cause Firefox to crash.","resolution":"Firefox 3.5.1 has been released to address this issue. See Mozilla Foundation Security Advisory 2009-41 for more information. Until updates can be applied, the below workarounds may mitigate this issue.","workarounds":"Disable TraceMonkey To disable the vulnerable components, use the about:config interface to set javascript.options.jit.content and javascript.options.jit.chrome to false. This will still allow JavaScript to run, but it will disable the TraceMonkey performance enhancements. Use NoScript Using the Mozilla Firefox NoScript extension to whitelist web sites that can run scripts will help to mitigate this vulnerability. Further details for configuring NoScript are available in the Securing Your Web Browser document. Disable JavaScript For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document.","sysaffected":"","thanks":"Information from zbyte, Mozilla, and other sources was used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://www.mozilla.org/security/announce/2009/mfsa2009-41.html","http://blog.mozilla.com/security/2009/07/14/critical-javascript-vulnerability-in-firefox-35/","https://bugzilla.mozilla.org/show_bug.cgi?id=503286","http://milw0rm.com/exploits/9137","http://kb.mozillazine.org/Firefox_:_FAQs_:_About:config_Entries","http://voices.washingtonpost.com/securityfix/2009/07/stopgap_fix_for_critical_firef.html?wprss=securityfix"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2009-07-14T12:38:57Z","publicdate":"2009-07-09T00:00:00Z","datefirstpublished":"2009-07-14T19:06:46Z","dateupdated":"2009-07-17T12:05:21Z","revision":22,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"40.5","cam_scorecurrentwidelyknown":"40.5","cam_scorecurrentwidelyknownexploited":"74.25","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"Not Defined (ND)","cvss_reportconfidence":"Not Defined (ND)","cvss_collateraldamagepotential":"Not Defined (ND)","cvss_targetdistribution":"Not Defined (ND)","cvss_securityrequirementscr":"Not Defined (ND)","cvss_securityrequirementsir":"Not Defined (ND)","cvss_securityrequirementsar":"Not Defined (ND)","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)","metric":40.5,"vulnote":null}