The NetBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows attackers to consume arbitrary amounts of stack memory and manipulate stack memory to assist in arbitrary code execution attacks. This affects NetBSD 7.1 and possibly earlier versions.
References
| Link | Resource |
|---|---|
| http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/stdlib/qsort.c?rev=1.23&content-type=text/x-cvsweb-markup | Third Party Advisory |
| http://www.securityfocus.com/bid/99255 | Third Party Advisory VDB Entry |
| https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | Third Party Advisory |
| http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/stdlib/qsort.c?rev=1.23&content-type=text/x-cvsweb-markup | Third Party Advisory |
| http://www.securityfocus.com/bid/99255 | Third Party Advisory VDB Entry |
| https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-06-19 16:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-1000378
Mitre link : CVE-2017-1000378
CVE.ORG link : CVE-2017-1000378
JSON object : View
Products Affected
netbsd
- netbsd
CWE
CWE-400
Uncontrolled Resource Consumption
