Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3156

Опубликовано: 26 янв. 2021
Источник: debian
EPSS Критический

Описание

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sudofixed1.9.5p1-1.1package

Примечания

  • https://www.sudo.ws/alerts/unescape_overflow.html

  • https://www.sudo.ws/repos/sudo/rev/9b97f1787804

  • https://www.sudo.ws/repos/sudo/rev/a97dc92eae6b

  • https://www.sudo.ws/repos/sudo/rev/049ad90590be

  • https://www.sudo.ws/repos/sudo/rev/09f98816fc89

  • https://www.sudo.ws/repos/sudo/rev/c125fbe68783

  • https://www.openwall.com/lists/oss-security/2021/01/26/3

EPSS

Процентиль: 100%
0.92309
Критический

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 5 лет назад

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

CVSS3: 7.8
redhat
около 5 лет назад

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

CVSS3: 7.8
nvd
около 5 лет назад

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

suse-cvrf
почти 5 лет назад

Security update for sudo

suse-cvrf
около 1 года назад

Security update for sudo

EPSS

Процентиль: 100%
0.92309
Критический