Stack Clash Vulnerability Affects Multiple UNIX-based Operating Systems

According to the Qualys Research Team, a vulnerability dubbed the Stack Clash exists within the memory management of the following operating systems on both i386 and amd64: Linux, OpenBSD, NetBSD, FreeBSD, and Solaris. If exploited, Stack Clash could be used to corrupt the memory of the targeted system, obtain full root privileges, and execute arbitrary code. The NJCCIC recommends all users and administrators of the aforementioned UNIX-based systems review the Stack Clash security advisory and the vendor advisories listed on theQualys Blogand apply the necessary updates or workarounds.