mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 02:00:45 +00:00
24 lines
1003 B
Markdown
24 lines
1003 B
Markdown
![]() |
### [CVE-2017-1000372](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000372)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
A flaw exists in OpenBSD's implementation of the stack guard page that allows attackers to bypass it resulting in arbitrary code execution using setuid binaries such as /usr/bin/at. This affects OpenBSD 6.1 and possibly earlier versions.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/ferovap/Tools
|
||
|
- https://github.com/lnick2023/nicenice
|
||
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||
|
- https://github.com/spencerdodd/kernelpop
|
||
|
- https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough
|
||
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||
|
|