Linux Desktop application slack executable does not use pie / no ASLR
Low
S
Slack
Submitted None
Actions:
Reported by
hanno
Vulnerability Details
Technical details and impact analysis
The slack binary from the Linux desktop application is no position independent executable:
$ file usr/lib/slack/slack
usr/lib/slack/slack: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, stripped
(pie executables report either "LSB shared object" or "LSB pie executable".)
Position independent executables are required for full ASLR support on Linux. Non-pie-binaries are loaded to a fixed location, thus allowing ROP attacks.
I'm aware that technically this is not a vulnerability, but a lack of a hardening feature. However given that ASLR is generally considered standard practice these days and that lack of it can mean very simple bugs can directly lead to code execution I think it deserves to be fixed.
## Impact
A simple memory corruption bug like a buffer overflow can easily lead to a remote code execution bug. With ASLR these bugs are much harder and sometimes impossible to exploit.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$100.00
Submitted
Weakness
Violation of Secure Design Principles