logoalt Hacker News

alanfranztoday at 6:10 PM5 repliesview on HN

Is this really exploitable? Is stack smashing really still a thing on any modern platform?


Replies

alanfranztoday at 6:13 PM

I’ll answer to myself: an RCE is very unlikely on any modern platform. DoS is possible.

“ Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution.”

From: https://openssl-library.org/news/secadv/20260127.txt

show 2 replies
chc4today at 6:27 PM

OpenSSL is used by approximately everything under the sun. Some of those users will be vendors that use default compiler flags without stack cookies. A lot of IoT devices for example still don't have stack cookies for any of their software.

MajesticHobo2today at 7:54 PM

Yes, but it would likely have to be chained with other bugs - at minimum, something that gives you an info leak.

JohnLeitchtoday at 7:02 PM

It depends on what mitigations are in place and the arrangement of the stack. Even with stack canaries, having an unfortunate value on the stack e.g. a function pointer can still be quite dangerous if it can be overwritten without hitting any of the stack canaries.

buckle8017today at 6:23 PM

That depends on how aggressively the service is restarted.