In FreeBSD before 11.2-RELEASE, multiple issues with the implementation of the stack guard-page reduce the protections afforded by the guard-page. This results in the possibility a poorly written process could be cause a stack overflow.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/42277/ | third party advisory vdb entry exploit |
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | third party advisory exploit technical description |
https://www.exploit-db.com/exploits/42278/ | third party advisory vdb entry exploit |