Engineering heap overflow exploits with JavaScript

  • Authors:
  • Mark Daniel;Jake Honoroff;Charlie Miller

  • Affiliations:
  • Independent Security Evaluators;Independent Security Evaluators;Independent Security Evaluators

  • Venue:
  • WOOT'08 Proceedings of the 2nd conference on USENIX Workshop on offensive technologies
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a new technique for exploiting heap overflows in JavaScript interpreters. Briefly, given a heap overflow, JavaScript commands can be used to insure that a function pointer is reliably present for smashing, just after the overflown buffer. A case study serves to highlight the technique: the Safari exploit that the authors used to win the 2008 CanSecWest Pwn2Own contest.