MWR published research in this area years ago in WebKit, and it appears that Firefox is lagging a few years behind. https://labs.mwrinfosecurity.com/blog/mwr-labs-pwn2own-2013-write-up-webkit-exploit/ …
-
-
Replying to @dguido
As far as exploit techniques, this is a routine UAF that heap sprays a controlled object to kick off a ROP chain. Pwn2Own 2012-level tech.
1 reply 20 retweets 26 likes -
Replying to @dguido
The controlled object eventually gives them RW access to memory, then its game over.
1 reply 2 retweets 4 likes -
Replying to @dguido
This is not an advanced exploit. If you want to see one of those, check out Pegasus which had to deal with code signing and JIT pages.
2 replies 11 retweets 19 likes -
Replying to @dguido
This type of exploit is much harder to write in Chrome and Edge due to memory partitioning, an exploit mitigation that Firefox lacks.
1 reply 13 retweets 14 likes -
Replying to @dguido
If you thought this exploit was from MSF, it's not. MSF has 8 Firefox exploits, none of them match this new one.
4 replies 3 retweets 2 likes -
Replying to @dguido
The version regex in the exploit matches Firefox 49, and the specific user-agent that the Tor Browser Bundle uses.pic.twitter.com/OjMf6T4JHA
1 reply 11 retweets 7 likes -
Replying to @dguido
The vulnerability is present on macOS, but the exploit does not include support for targeting any operating system but Windows.
1 reply 8 retweets 6 likes -
Replying to @dguido
If you were wondering, Mozilla is aware of the bug and has an open issue to track it.http://hg.mozilla.org/mozilla-central/rev/adcc39e3cad0 …
2 replies 9 retweets 6 likes -
Replying to @dguido
It's not possible to determine the origin of the bug -- fuzzer or manual analysis. IMHO the author developed the exploit from scratch.
1 reply 7 retweets 6 likes
The shellcode is fairly simple. It calls back to 5.39.27.226 (check your logs). Again, nothing outrageous here.
-
-
Replying to @dguido
Final thoughts: the Tor Browser Bundle is unable to protect those that need it most. If you rely on it, strongly reconsider your choices.
4 replies 36 retweets 42 likes -
Replying to @dguido
Consider the difficulty of running a Tor exit node that injects this exploit into every HTTP session. ¯\_(ツ)_/¯
2 replies 14 retweets 19 likes - 2 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.