Skip to content

Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass

License

Notifications You must be signed in to change notification settings

theori-io/jscript9-typedarray-cfg

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

jscript9.dll TypedArray/DataView Memory Corruption

Proof-of-Concept exploit for jscript9 bug (MS16-063) w/ CFG bypass

Tested on Windows 10 IE11 (modern.ie).

Write-up

http://theori.io/research/chakra-jit-cfg-bypass

To run

  1. Download exploit/jscript_win10_jit.html to a directory.
  2. Serve the directory using a webserver (or python's simple HTTP server).
  3. Browse with a victim IE to jscript_win10_jit.html.
  4. (Re-fresh or re-open in case it doesn't work; It's not 100% reliable.)

About

Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages