The Stack Clash – Linux root privilege escalation vulnerability
by CIRT Team
Description: The flaw was discovered last month by security researchers from Qualys, who worked with various vendors to make sure patches are available before going public with their findings. According to Qualys researchers, the issue affects a host of *NIX systems, such as Linux, OpenBSD, NetBSD, FreeBSD, and Solaris. Researchers only tested Stack Clash on the i386 and amd64 platforms, and they don’t exclude that other vendors and platforms may also be affected. This vulnerability has been assigned two CVE names, CVE-2017-1000364 for the Linux kernel and CVE-2017-1000366 for glibc.
Impact: An attacker can exploit this issue & May able to get “root” user privileges of the system.
Mitigation: Updates are available. Please see the references for more information.
Reference URL’s:
- https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
- https://access.redhat.com/security/vulnerabilities/stackguard
- https://access.redhat.com/security/cve/CVE-2017-1000364
- https://access.redhat.com/security/cve/CVE-2017-1000366
- https://security-tracker.debian.org/tracker/CVE-2017-1000364
- https://security-tracker.debian.org/tracker/CVE-2017-1000366
- http://www.securityfocus.com/bid/99130/info
- http://www.securityfocus.com/bid/99127
Recommended Posts
Active Exploitation of Critical F5 BIG – IP Vulnerability (CVE–2023-46747) Uncovered in Bangladesh
06 Nov 2024 - Security Advisories & Alerts