-
CVSS Score
-The vulnerability stems from improper bound check elimination in Chakra's JIT compiler. The commit adds a 'followFlow' parameter and block tracking (blockBV) to InvariantBlockBackwardIterator, indicating the original implementation did not properly follow control flow paths. The OptArraySrc function used this flawed iterator to hoist bound checks, leading to scenarios where critical checks were incorrectly removed (as demonstrated in the PoC). The CWE-787 classification and exploit analysis confirm this results in memory corruption via out-of-bounds writes.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Microsoft.ChakraCore | nuget | < 1.8.3 | 1.8.3 |