CVE-2018-8227: ChakraCore RCE Vulnerability
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.96348%
CWE
Published
5/13/2022
Updated
10/6/2023
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Microsoft.ChakraCore | nuget | < 1.8.5 | 1.8.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper bounds checking in the JIT compiler's object type handling. The commit diff shows a critical modification in Func.cpp
where a weak Assert()
was replaced with AssertOrFailFast()
to validate()
array indices. This indicates the original Func
constructor lacked proper release-build validation for ObjTypeSpecFldId
values, enabling OOB writes to m_globalObjTypeSpecFldInfoArray
when fed malicious input. The CWE-787
classification and commit message explicitly reference this JIT processing flaw as the root cause.