Google’s Project Zero team has published details of an unfixed bypass for an important exploit-mitigation technique in Edge. From a : The mitigation, Arbitrary Code Guard (ACG), arrived in the Windows 10 Creators to help thwart web attacks that attempt to load malicious code into memory. The defense ensures that only properly signed code can be mapped into memory. However, as Microsoft explains, Just-in-Time (JIT) compilers used in modern web browsers create a problem for ACG. JIT compilers transform JavaScript into native code, some of which is unsigned and runs in a process. To ensure JIT compilers work with ACG enabled, Microsoft put Edge’s JIT compiling in a separate process that runs in its own isolated sandbox. Microsoft said move was “a non-trivial engineering task.” “The JIT process is responsible for compiling JavaScript to native code and mapping it into the requesting content process. In way, the content process itself is never allowed to directly map or modify its own JIT code ,” Microsoft says. Google’s Project Zero found an issue is created by the way the JIT process writes executable data into the content process.

Share on Google+

Read more of this at Slashdot.