NetBSD maps the run-time link-editor ld.so directly below the stack region, even if ASLR is enabled, this allows attackers to more easily manipulate memory leading to arbitrary code execution. This affects NetBSD 7.1 and possibly earlier versions.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/99257 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/42272/ | |
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/99257 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/42272/ | |
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/99257 - Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/42272/ - | |
References | () https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt - Exploit, Third Party Advisory |
Information
Published : 2017-06-19 16:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000375
Mitre link : CVE-2017-1000375
CVE.ORG link : CVE-2017-1000375
JSON object : View
Products Affected
netbsd
- netbsd
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer