Stack Clash Vulnerability in Linux, BSD Systems Enables Root Access

Discussion in 'all things UNIX' started by itman, Jun 19, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    4,324
    Location:
    U.S.A.
    https://threatpost.com/stack-clash-vulnerability-in-linux-bsd-systems-enables-root-access/126355/
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    4,324
    Location:
    U.S.A.
    https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash
     
  3. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,369
  4. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    1,974
    Debian is not affected by the sudo vulnerability because sudo is not installed by default.

    Ubuntu on the other hand does run sudo.
     
  5. SuperSapien

    SuperSapien Registered Member

    Joined:
    Apr 9, 2015
    Posts:
    146
  6. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    59,594
    Location:
    Texas
    Last edited: Jun 21, 2017
  7. summerheat

    summerheat Registered Member

    Joined:
    May 16, 2015
    Posts:
    902
    I think so. First, sudo and su (and other important stuff) are blacklisted in disable-common.inc. Second, seccomp and nonewprivs should prevent privilege escalation. Third, many profiles (e.g. for Firefox) contain noexec ${HOME} and noexec /tmp which means that those folders are mounted noexec, nodev and nosuid so execution of malware should be blocked in the first place.
     
Loading...