vendor:
Sudo
by:
West Shepherd
7.8
CVSS
HIGH
Heap-Based Buffer Overflow
119
CWE
Product Name: Sudo
Affected Version From: 1.8.2
Affected Version To: 1.9.5p1
Patch Exists: YES
Related CWE: CVE-2021-3156
CPE: a:sudo:sudo
Metasploit:
https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/apple-osx-sudo-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/redhat-openshift-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp8-cve-2021-3156/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2021-3156/
Other Scripts:
N/A
Platforms Tested: Ubuntu 20.04.1 LTS
2021
Sudo 1.9.5p1 – ‘Baron Samedit ‘ Heap-Based Buffer Overflow Privilege Escalation (1)
Sudo versions from 1.8.2 to 1.8.31p2, stable versions from 1.9.0 to 1.9.5p1 are vulnerable to a heap-based buffer overflow. This vulnerability can be exploited by an attacker to gain root privileges. The exploit code is written in Python3 and requires the attacker to have a valid user account on the target system. The exploit code creates a malicious environment variable and executes the sudo command with the malicious environment variable. This causes a heap-based buffer overflow and allows the attacker to gain root privileges.
Mitigation:
Upgrade to the latest version of Sudo (1.9.5p2) to mitigate this vulnerability.