Microsoft Edge; Google's Project Zero team has released a number of details that help circumvent an important Edge security technique.
Arbitrary Code Guard (ACG), released with the release of Windows 10 Creators Update to help prevent web attacks from trying to load malicious code. This technique ensures that the memory receives only properly signed code.
So to ensure that JIT compilers continue to run even when ACG is enabled, the company's developers split Microsoft Edge JIT into a separate process running on its own isolated sandbox.
But here came the researchers from Google's Project Zero. Researchers have found that there is a problem with the way the JIT process writes executable data to the content.
THE 'bypass the ACG using UnmapViewofFileallows a content process to predict which address of a JIT process VirtualAllocEx () may call, as well as a content process that is preparing to "allocate a writable memory area to the same JIT server address for an executable to run soon" .
Google reported the issue to Microsoft in mid-November and released the details of the exploit yesterday, as the 90 days have passed.
Microsoft confirmed the ACG bypass at some point in Patch Tuesday, which was released in February. Apparently the company intended to fix the issue by then, but found it a bit "more complicated" than it initially thought.
Registration in iGuRu.gr via Email
So the solution for a secure Microsoft Edge is expected to be released with Patch Tuesday in March.