The NetBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows attackers to consume arbitrary amounts of stack memory and manipulate stack memory to assist in arbitrary code execution attacks. This affects NetBSD 7.1 and possibly earlier versions.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | Third Party Advisory | 
| http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/stdlib/qsort.c?rev=1.23&content-type=text/x-cvsweb-markup | Third Party Advisory | 
| http://www.securityfocus.com/bid/99255 | Third Party Advisory VDB Entry | 
Configurations
                    Information
                Published : 2017-06-19 09:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-1000378
Mitre link : CVE-2017-1000378
JSON object : View
CWE
                
                    
                        
                        CWE-400
                        
            Uncontrolled Resource Consumption
Products Affected
                netbsd
- netbsd


