NetBSD maps the run-time link-editor ld.so directly below the stack region, even if ASLR is enabled, this allows attackers to more easily manipulate memory leading to arbitrary code execution. This affects NetBSD 7.1 and possibly earlier versions.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/42272/ | exploit |
http://www.securityfocus.com/bid/99257 | vdb entry third party advisory |
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | third party advisory exploit |