Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-1085

Опубликовано: 12 сент. 2018
Источник: debian
EPSS Низкий

Описание

In FreeBSD before 11.2-RELEASE, an application which calls setrlimit() to increase RLIMIT_STACK may turn a read-only memory region below the stack into a read-write region. A specially crafted executable could be exploited to execute arbitrary code in the user context.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-10removedpackage

Примечания

  • https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt

  • kfreebsd not covered by security support

EPSS

Процентиль: 70%
0.0062
Низкий

Связанные уязвимости

CVSS3: 7.8
nvd
больше 7 лет назад

In FreeBSD before 11.2-RELEASE, an application which calls setrlimit() to increase RLIMIT_STACK may turn a read-only memory region below the stack into a read-write region. A specially crafted executable could be exploited to execute arbitrary code in the user context.

CVSS3: 7.8
github
больше 3 лет назад

In FreeBSD before 11.2-RELEASE, an application which calls setrlimit() to increase RLIMIT_STACK may turn a read-only memory region below the stack into a read-write region. A specially crafted executable could be exploited to execute arbitrary code in the user context.

EPSS

Процентиль: 70%
0.0062
Низкий