vendor:
Native Client
by:
Mark Seaborn
7.8
CVSS
HIGH
Rowhammer Bug
119
CWE
Product Name: Native Client
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2015
Exploiting DRAM Rowhammer Bug to Gain Kernel Privileges
This is a proof-of-concept exploit that is able to escape from Native Client's x86-64 sandbox on machines that are susceptible to the DRAM 'rowhammer' problem. It works by inducing a bit flip in read-only code so that the code is no longer safe, producing instruction sequences that wouldn't pass NaCl's x86-64 validator. There are two ways to test the exploit program without getting a real rowhammer-induced bit flip: Unit testing and Testing inside NaCl.
Mitigation:
Disable CLFLUSH instruction in newer versions of NaCl.