Search the Community
Showing results for tags 'confusion'.
-
Exploits JavaScriptCore GetterSetter Type Confusion
1337day-Exploits posted a topic in Updated Exploits
JavaScriptCore (JSC) GetterSetter suffers from a type confusion vulnerability during DFG compilation. View the full article-
- javascriptcore
- gettersetter
-
(and 2 more)
Tagged with:
-
V8 map migration does not respect element kind, leading to a type confusion vulnerability. View the full article
-
A type confusion has been identified in the Thunderbird email client. The issue is present in the libical implementation, which was forked from upstream libical version 0.47. The issue can be triggered remotely, when an attacker sends an specially crafted calendar attachment and does not require user interaction. It might be used by a remote attacker to crash the process or leak information from the client system via calendar replies. Proof of concept included. View the full article
-
- thunderbird
- libical
-
(and 2 more)
Tagged with:
-
Exploits Safari Webkit Proxy Object Type Confusion
1337day-Exploits posted a topic in Updated Exploits
This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion (CVE-2018-4233). The type confusion leads to the ability to allocate fake Javascript objects, as well as the ability to find the address in memory of a Javascript object. This allows us to construct a fake JSCell object that can be used to read and write arbitrary memory from Javascript. The module then uses a ROP chain to write the first stage shellcode into executable memory within the Safari process and kick off its execution. The first stage maps the second stage macho (containing CVE-2017-13861) into executable memory, and jumps to its entrypoint. The CVE-2017-13861 async_wake exploit leads to a kernel task port (TFP0) that can read and write arbitrary kernel memory. The processes credential and sandbox structure in the kernel is overwritten and the meterpreter payloads code signature hash is added to the kernels trust cache, allowing Safari to load and execute the (self-signed) meterpreter payload. View the full article -
Chrome suffers from a type confusion vulnerability in JSPromise::TriggerPromiseReactions. View the full article
-
- chrome
- jspromise::triggerpromisereactions
-
(and 2 more)
Tagged with:
-
Chrome suffers from a type confusion vulnerability in V8TrustedTypePolicyOptions::ToImpl. View the full article
-
- chrome
- v8trustedtypepolicyoptions::toimpl
-
(and 2 more)
Tagged with:
-
A bug in IonMonkey leaves type inference information inconsistent, which in turn allows the compilation of JITed functions that cause type confusions between arbitrary objects. View the full article
-
- spidermonkey
- ionmonkey
-
(and 2 more)
Tagged with:
-
A bug in IonMonkeys type inference system when JIT compiling and entering a constructor function via on-stack replacement (OSR) allows the compilation of JITed functions that cause type confusions between arbitrary objects. View the full article
-
- spidermonkey
- ionmonkey
-
(and 2 more)
Tagged with:
-
Exploits Microsoft Edge Chakra 1.11.4 Type Confusion
1337day-Exploits posted a topic in Updated Exploits
Microsoft Edge Chakra version 1.11.4 read permission via type confusion proof of concept exploit. View the full article -
This Metasploit module exploits a type confusion on Adobe Flash Player, which was originally found being successfully exploited in the wild. This module has been tested successfully on: macOS Sierra 10.12.3, Safari and Adobe Flash Player 21.0.0.182, Firefox and Adobe Flash Player 21.0.0.182. View the full article
-
Microsoft Edge has an issue where NewScObjectNoCtor and InitProto opcodes are treated as having no side effects, but actually they can have via the SetIsPrototype method of the type handler that can cause transition to a new type. This can lead to type confusion in the JITed code. View the full article
-
This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion. View the full article
-
When a for-in loop is executed, a JSPropertyNameEnumerator object is created at the beginning and used to store the information of the input object to the for-in loop. Inside the loop, the structure ID of the "this" object of every get_by_id expression taking the loop variable as the index is compared to the cached structure ID from the JSPropertyNameEnumerator object. If it's the same, the "this" object of the get_by_id expression will be considered having the same structure as the input object to the for-in loop has. The problem is, it doesn't have anything to prevent the structure from which the cached structure ID from being freed. As structure IDs can be reused after their owners get freed, this can lead to type confusion. View the full article
-
Exploits Microsoft Edge Chakra JIT Type Confusion Bug
1337day-Exploits posted a topic in Updated Exploits
Microsoft Edge suffers from a Chakra JIT type confusion bug. View the full article -
The InitializeNumberFormat function in Intl.js is used to initialize an Intl.NumberFormat object, and InitializeDateTimeFormat is used for an Intl.DateTimeFormat object. There are two versions of each initializer. One is for WinGlob and the other is for ICU. The problem is that the versions for ICU don't check whether the given object has been initialized. This allows to initialize the same object multiple times which can lead to type confusion. View the full article