Security News Stack Clash Vulnerability Grants Root Access on Linux and Other UNIX OSes

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
...quotes from the article above:

Attacker needs local access. Remote exploitation unknown.
This attack is a classic elevation of privilege (EoP) vulnerability. EoP flaws are not considered dangerous because they usually require an attacker to be already present on the user's system.

Qualys says it put together proof-of-concept exploits for Stack Clash on various operating systems, which it intends to release at a later date. All PoCs require an attacker to have local access, but researchers don't rule out scenarios where an attacker could exploit Stack Clash from a remote location (via HTTP requests or JavaScript code, for example).


A vulnerability nicknamed "Stack Clash" allows an attacker to gain root privileges on a UNIX system and take over vulnerable machines.

The flaw was discovered last month by security researchers from Qualys, who worked with various vendors to make sure patches are available before going public with their findings.

According to Qualys researchers, the issue affects a host of *NIX systems, such as Linux, OpenBSD, NetBSD, FreeBSD, and Solaris. Researchers only tested Stack Clash on the i386 and amd64 platforms, and they don't exclude that other vendors and platforms may also be affected.

Issue was first discovered back in 2005
At the heart of this vulnerability is an issue that has been known since 2005, patched, then rediscovered to be vulnerable again in 2010, patched, and now discovered again.
 

cyberfort

Level 2
Verified
May 18, 2017
86
Nowadays most of the android OS come with a locked bootloader

Its nearly impossible to root without PC
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top