Microsoft Edge Scripting Engine ... CVE-2017-11809 CNNVD-201710-177

7.6 AV AC AU C I A
发布: 2017-10-13
修订: 2017-10-20

Here's a snippet of the method that interprets a javascript function's bytecode. ``` Js::Var Js::InterpreterStackFrame::INTERPRETERLOOPNAME() { PROBE_STACK(scriptContext, Js::Constants::MinStackInterpreter); <<----- (a) if (!this->closureInitDone) { Assert(this->m_reader.GetCurrentOffset() == 0); this->InitializeClosures(); <<------- (b) } ... ... interprets the bytecode ... ``` At (b), it initializes the local variables of the javascript function. In the PoC, the variables a, b and c are initialized. But at (a), if it fails to allocate Js::Constants::MinStackInterpreter bytes to the stack, it throws an exception which leads to the following code. ``` void StackScriptFunction::BoxState::Box() { ... if (callerFunctionBody->DoStackScopeSlots()) { Var* stackScopeSlots = (Var*)interpreterFrame->GetLocalClosure(); if (stackScopeSlots) { Var* boxedScopeSlots = this->BoxScopeSlots(stackScopeSlots, ScopeSlots(stackScopeSlots).GetCount());...

0%
当前有3条漏洞利用/PoC
当前有7条受影响产品信息