Stack Clash Vulnerability in Linux, BSD Systems Enables Root Access

Discussion in 'all things UNIX' started by itman, Jun 19, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    https://threatpost.com/stack-clash-vulnerability-in-linux-bsd-systems-enables-root-access/126355/
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash
     
  3. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  4. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,882
    Debian is not affected by the sudo vulnerability because sudo is not installed by default.

    Ubuntu on the other hand does run sudo.
     
  5. SuperSapien

    SuperSapien Registered Member

    Joined:
    Apr 9, 2015
    Posts:
    227
  6. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,154
    Location:
    Texas
    Last edited: Jun 21, 2017
  7. summerheat

    summerheat Registered Member

    Joined:
    May 16, 2015
    Posts:
    2,199
    I think so. First, sudo and su (and other important stuff) are blacklisted in disable-common.inc. Second, seccomp and nonewprivs should prevent privilege escalation. Third, many profiles (e.g. for Firefox) contain noexec ${HOME} and noexec /tmp which means that those folders are mounted noexec, nodev and nosuid so execution of malware should be blocked in the first place.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.