Jan 7, 2026·6 min read·4 visits
NetBSD mapped the dynamic linker directly below the stack. Attackers could allocate large buffers to 'jump' over the stack guard page and write directly into the linker's memory. This allows for reliable Local Privilege Escalation (LPE), effectively bypassing ASLR and stack protections.
A fundamental memory management flaw in NetBSD allowed the stack to collide with the dynamic linker (ld.so), bypassing guard pages and enabling arbitrary code execution. Part of the broader 'Stack Clash' research by Qualys.
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
NetBSD NetBSD | <= 7.1 | Subject to patch availability (Post-2017 updates) |
| Attribute | Detail |
|---|---|
| Attack Vector | Local (Stack manipulation) |
| CVSS v3.0 | 9.8 (Critical) |
| Bug Class | Stack Clash / Memory Corruption |
| Target Component | ld.so (Dynamic Linker) |
| Exploit Reliability | High (Deterministic memory layout) |
| EPSS Score | 38.41% |
Out-of-bounds Write