Microsoft Windows LNK File Code Execution

Microsoft Windows LNK File Code Execution

This Metasploit module exploits a vulnerability in the handling of Windows Shortcut files (.LNK) that contain a dynamic icon, loaded from a malicious DLL. This vulnerability is a variant of MS15-020 (CVE-2015-0096). The created LNK file is similar except an additional SpecialFolderDataBlock is included. The folder ID set in this SpecialFolderDataBlock is set to the […]

The post Microsoft Windows LNK File Code Execution appeared first on MondoUnix.

Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call

Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call

The “String.prototype.replace” method can be inlined in the JIT process. So in the method, all the calls which may break the JIT assumptions must be invoked with updating “ImplicitCallFlags”. But “RegexHelper::StringReplace” calls the replace function without updating the flag. Therefore it fails to detect if a user function was called. Source: Microsoft Edge Chakra JIT […]

The post Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call appeared first on MondoUnix.