Microsoft Edge; attention until next month

Microsoft Edge; Google's Project Zero team has released a number of details that help circumvent an important Edge security technique.

Let's see what the problem is:Microsoft Edge

Arbitrary Code Guard (ACG), released with the release of Windows 10 Creators Update to help prevent web attacks from trying to load malicious code. This technique ensures that the memory receives only properly signed code.

However, as Microsoft explains, Just-in-Time (JIT) compilers used in modern web browsers pose a problem for ACG. JIT compilers convert JavaScript into native, unsigned code.

So to ensure that JIT compilers continue to run even when ACG is enabled, the company's developers split Microsoft Edge JIT into a separate process running on its own isolated sandbox.

But here came the researchers from Google's Project Zero. Researchers have found that there is a problem with the way the JIT process writes executable data to the content.

THE 'bypass the ACG using UnmapViewofFileallows a content process to predict which address of a JIT process VirtualAllocEx () may call, as well as a content process that is preparing to "allocate a writable memory area to the same JIT server address for an executable to run soon" .

Google reported the issue to Microsoft in mid-November and released the details of the exploit yesterday, as the 90 days have passed.

Microsoft confirmed the ACG bypass at some point in Patch Tuesday, which was released in February. Apparently the company intended to fix the issue by then, but found it a bit "more complicated" than it initially thought.

Registration in via Email

Enter your email to subscribe to the email notification service for new posts.

So the solution for a secure Microsoft Edge is expected to be released with Patch Tuesday in March.

Read them Technology News from all over the world, with the validity of

Follow us on Google News at Google news