Home Security Stack Clash flaw opens Linux, BSDs to local exploit

Stack Clash flaw opens Linux, BSDs to local exploit

Stack Clash flaw opens Linux, BSDs to local exploit Featured

Cloud security provider Qualys has released details of a vulnerability related to memory management in most *NIX-like operating systems.

The vulnerability, called Stack Clash, affects Linux, OpenBSD, NetBSD, FreeBSD and Solaris, on the i386 and amd64 platforms and can be exploited to corrupt memory and execute arbitrary code.

Qualys said that the vulnerability, as far as the seven exploits it had developed showed, was not exploitable remotely, which means that an attacker would have to already be on a system as an unprivileged user in order to cause mischief.

The company released details of the vulnerability in co-ordination with major Linux and other distributions so that patches could be made available on Monday.

{laodposition sam08}Explaining the nature of the vulnerability, Qualys said that each program used a special memory region called the stack which would increase automatically in size when needed. However if the stack grew too much and gained too much proximity to another memory region, then the program in question could confuse the stack with another memory region.

A potential attacker could exploit this confusion to either overwrite the stack with another memory region or vice versa.

This type of vulnerability is not new, having been exploited in 2005 and 2010. But, Qualys said, though Linux developers had introduced a stack guard-page to prevent such exploits, a stack clash was still possible.

The Qualys researchers said while the primary Stack Clash vulnerability was a single flaw, there were others that were related and could be exploited independently.


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.


Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.


Popular News