- Feb 4, 2016
- 2,520
...quotes from the article above:
Attacker needs local access. Remote exploitation unknown.
This attack is a classic elevation of privilege (EoP) vulnerability. EoP flaws are not considered dangerous because they usually require an attacker to be already present on the user's system.
Qualys says it put together proof-of-concept exploits for Stack Clash on various operating systems, which it intends to release at a later date. All PoCs require an attacker to have local access, but researchers don't rule out scenarios where an attacker could exploit Stack Clash from a remote location (via HTTP requests or JavaScript code, for example).
A vulnerability nicknamed "Stack Clash" allows an attacker to gain root privileges on a UNIX system and take over vulnerable machines.
The flaw was discovered last month by security researchers from Qualys, who worked with various vendors to make sure patches are available before going public with their findings.
According to Qualys researchers, the issue affects a host of *NIX systems, such as Linux, OpenBSD, NetBSD, FreeBSD, and Solaris. Researchers only tested Stack Clash on the i386 and amd64 platforms, and they don't exclude that other vendors and platforms may also be affected.
Issue was first discovered back in 2005
At the heart of this vulnerability is an issue that has been known since 2005, patched, then rediscovered to be vulnerable again in 2010, patched, and now discovered again.