TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How is my Browser blocking RWX execution?

48 点作者 lucasRW5 个月前

6 条评论

cmeacham984 个月前
&gt; this is probably a mitigating control which would make exploit development much harder in case an exploit chain attempted to leverage one of those RWX areas for execution<p>This didn&#x27;t pass the sniff test for me - this doesn&#x27;t do anything to protect existing RWX regions, and a theoretical attacker that has the ability to inject arbitrary DLLs into the browser process already has access far beyond what the browser could protect.<p>Fortunately, because the browser in question (Firefox) is open source, we can find the change that added this code. This is a bit of a pain because the file has been renamed twice, but here it is: <a href="https:&#x2F;&#x2F;hg.mozilla.org&#x2F;mozilla-central&#x2F;rev&#x2F;7d2e74c69253e57fd7569d1e969959c5f2a36663" rel="nofollow">https:&#x2F;&#x2F;hg.mozilla.org&#x2F;mozilla-central&#x2F;rev&#x2F;7d2e74c69253e57fd...</a><p>And if we read the associated bug (<a href="https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=1322554" rel="nofollow">https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=1322554</a>) we can see this is described as &quot;policy decision&quot;, and this entire section of the code isn&#x27;t exploit mitigation, but rather intended to block broken third party programs from injecting their buggy and poorly written DLLs into Firefox and causing bugs that users report to Mozilla.
评论 #42636362 未加载
评论 #42639138 未加载
cma4 个月前
They just use the acronym EDR without introducing it, it&#x27;s &quot;Endpoint Detection and Response&quot;
评论 #42631413 未加载
dblohm74 个月前
The browser is Firefox, and I&#x27;m the engineer (no longer at Mozilla) who spearheaded the development of this. AMA.
评论 #42637958 未加载
atesti4 个月前
While security software and antivirus deserve all the injection blocking they may get, we must also consider how to bypass these mechanism when it&#x27;s about reenabling adblocking by injecting DLLs in the browser for request blocking etc.
评论 #42636458 未加载
m30474 个月前
Just the other day I saw a shitpost from someone to the effect that if &quot;BDR&quot; is a thing they&#x27;re going to quit cybersecurity entirely. Did you know there is a company actually offering BDR? Apparently that&#x27;s true.
Retr0id4 个月前
&gt; Note: this may be overzealous but to avoid legal issues I will not name that browser or the files&#x2F;functions involved<p>Curious, anyone else want to name the browser?
评论 #42630159 未加载
评论 #42630083 未加载
评论 #42630042 未加载