by lucasRW on 1/5/25, 11:08 AM with 33 comments
by cmeacham98 on 1/8/25, 3:17 AM
This didn't pass the sniff test for me - this doesn't do anything to protect existing RWX regions, and a theoretical attacker that has the ability to inject arbitrary DLLs into the browser process already has access far beyond what the browser could protect.
Fortunately, because the browser in question (Firefox) is open source, we can find the change that added this code. This is a bit of a pain because the file has been renamed twice, but here it is: https://hg.mozilla.org/mozilla-central/rev/7d2e74c69253e57fd...
And if we read the associated bug (https://bugzilla.mozilla.org/show_bug.cgi?id=1322554) we can see this is described as "policy decision", and this entire section of the code isn't exploit mitigation, but rather intended to block broken third party programs from injecting their buggy and poorly written DLLs into Firefox and causing bugs that users report to Mozilla.
by cma on 1/8/25, 1:50 AM
by dblohm7 on 1/8/25, 5:16 PM
by atesti on 1/8/25, 7:59 AM
by m3047 on 1/8/25, 6:49 PM
by Retr0id on 1/8/25, 1:37 AM
Curious, anyone else want to name the browser?