NTLM Reflection Attack
It is possible to use the NTLM reflection attack to escape a browser sandbox in the case where the sandboxed process is allowed to create TCP sockets. This attack was described in https://bugs.chromium.org/p/project-zero/issues/detail?id=222. MS16-075 was supposed to fix it by blocking attempts to reflect NTLM authentication operating in the same machine mode. However, it is still possible to reflect NTLM authentication that works in the regular remote mode. In the actual exploit, a compromised sandboxed process acts as both a web server and an SMB client, and asks the browser to visit http://localhost:[fake_webserver_port]. The browser receives an NTLM authentication request and considers the `localhost` domain to be safe to automatically log on with the current user's credentials. The sandboxed process forwards the corresponding packets to the local SMB server. Additionally, an insufficient path check in EFSRPC can be used to bypass security checks and gain file system access.