It is reported that PaX contains a privilege escalation vulnerability. Local unprivileged users may exploit this vulnerability to execute arbitrary code with the privileges of any targeted user. It is also conjectured that remote attackers may also be able to exploit this vulnerability, but exploitability depends on the ability of an attacker to control the executable file mappings of a targeted application. This issue is only exploitable if SEGMEXEC or RANDEXEC are enabled in the kernel configuration. This vulnerability is reported to affect all versions of PaX since September, 2003, when VMA mirroring was introduced.
It is reported that PaX contains a privilege escalation vulnerability. Local unprivileged users may exploit this vulnerability to execute arbitrary code with the privileges of any targeted user. It is also conjectured that remote attackers may also be able to exploit this vulnerability, but exploitability depends on the ability of an attacker to control the executable file mappings of a targeted application. This issue is only exploitable if SEGMEXEC or RANDEXEC are enabled in the kernel configuration. This vulnerability is reported to affect all versions of PaX since September, 2003, when VMA mirroring was introduced.