[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Microsoft MsMpEng - Use-After-Free via Saved Callers Exploit

Author
Google Security Research
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-27869
Category
dos / poc
Date add
31-05-2017
CVE
CVE-2017-8541
Platform
windows
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1259
 
In JsRuntimeState::setCaller, it saves the current caller in the JsRuntimeState object(rcx+158h in 64-bit). But the garbage collector doesn't mark this saved value. So it results in a UAF.
 
Unlike in our test environment(Linux), it doesn't make reliable crashes on Windows. So I used another bug(#1258) to confirm the bug. If the UAF bug doesn't exist, the "crash" function will not be called(See poc.js).
 
The password of the zip file is "calleruaf"
 
 
Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/42092.zip

#  0day.today [2024-10-06]  #