Qualys discovers new vulnerability 'Stack Clash' in Linux
Qualys developed seven exploits and seven proof of concept for the vulnerability and worked with vendors to develop patches
Qualys' researchers have discovered a new vulnerability affecting Linux and other platforms.
The discovery, dubbed Stack Clash, enables an attackers to gain local privilege escalations and obtain full root privileges of the targeted system.
Each program running on a computer uses a unique memory region called the stack, and grows each time the program require additional stack memory. If it exceeds its growth and gets too close to another memory region, the two can confuse one another allowing a hacker to use this confusion to overwrite the stack.
This method is not new and forced Linux to introduce protections, however Qualys' discovery shows that stack clashes are still widespread and exploitable despite Qualys guard-page protection.
Qualys developed seven exploits and seven proof of concept for the vulnerability and worked with vendors to develop patches.
Jimmy Graham, director of Product Management, Qualys, said: "Vulnerability management plays a crucial role in providing companies with the monitoring and detection tools needed to ensure weaknesses such as Stack Clash can be mitigated before attackers take advantage.
"The most effective and easiest way for businesses to secure their systems, is by updating them regularly. Qualys worked closely with the vendors in question to develop the necessary patches for Stack Clash. We strongly recommend that users place a high priority on patching these vulnerabilities immediately, and will continue to publish further advisories as required."