Hi Shawn,

Nice p0c, but it don't work with security.bsd.unprivileged_proc_debug=0,
which was initially enabled in the menu with hardening options.

Pawel.


On 20 June 2017 at 14:15, Shawn Webb <shawn.w...@hardenedbsd.org> wrote:

> On Tue, Jun 20, 2017 at 08:13:46AM +0000, Vladimir Terziev wrote:
> > Hi,
> >
> > I assume FreeBSD security team is already aware about the Stack Clash
> vulnerability, that is stated to affect FreeBSD amongst other Unix-like OS.
> >
> > Just in case here is the analyses document of Qualys:
> >
> > https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
>
> FreeBSD is indeed affected. I've written a PoC, which works even with
> the stack guard enabled:
>
> https://github.com/lattera/exploits/blob/master/FreeBSD/
> StackClash/001-stackclash.c
>
> Thanks,
>
> --
> Shawn Webb
> Cofounder and Security Engineer
> HardenedBSD
>
> GPG Key ID:          0x6A84658F52456EEE
> GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89  3D9E 6A84 658F 5245 6EEE
>



-- 
One of God's own prototypes. A high-powered mutant of some kind never
even considered for mass production. Too weird to live, and too rare to die.
_______________________________________________
freebsd-security@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to