The NetBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows attackers to consume arbitrary amounts of stack memory and manipulate stack memory to assist in arbitrary code execution attacks. This affects NetBSD 7.1 and possibly earlier versions.
References
Link | Resource |
---|---|
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/stdlib/qsort.c?rev=1.23&content-type=text/x-cvsweb-markup | Third Party Advisory |
http://www.securityfocus.com/bid/99255 | Third Party Advisory VDB Entry |
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-06-19 16:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-1000378
Mitre link : CVE-2017-1000378
CVE.ORG link : CVE-2017-1000378
JSON object : View
Products Affected
netbsd
- netbsd
CWE
CWE-400
Uncontrolled Resource Consumption