[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Security Bypass vulnerability in stack randomization feature in linux kernel before 3.19.1 on 64-bit platforms

Deprecated
ID: oval:org.secpod.oval:def:24040Date: (C)2015-04-07   (M)2024-04-17
Class: VULNERABILITYFamily: unix




The host is installed with linux kernel before 3.19.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which uses incorrect data types for the results of bitwise left-shift operations. Successful exploitation allows attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.

Platform:
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Product:
kernel
Reference:
CVE-2015-1593
CVE    1
CVE-2015-1593
CPE    3
cpe:/o:linux:linux_kernel
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6

© SecPod Technologies