Vulnerability Description
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sudo Project | Sudo | >= 1.8.2, < 1.8.32 |
| Fedoraproject | Fedora | 32 |
| Debian | Debian Linux | 9.0 |
| Netapp | Active Iq Unified Manager | - |
| Netapp | Cloud Backup | - |
| Netapp | Hci Management Node | - |
| Netapp | Oncommand Unified Manager Core Package | - |
| Netapp | Ontap Select Deploy Administration Utility | - |
| Netapp | Ontap Tools | 9 |
| Netapp | Solidfire | - |
| Mcafee | Web Gateway | 8.2.17 |
| Synology | Diskstation Manager Unified Controller | 3.0 |
| Synology | Diskstation Manager | 6.2 |
| Synology | Skynas Firmware | - |
| Synology | Skynas | - |
| Synology | Vs960Hd Firmware | - |
| Synology | Vs960Hd | - |
| Beyondtrust | Privilege Management For Mac | < 21.1.1 |
| Beyondtrust | Privilege Management For Unix\/Linux | < 10.3.2-10 |
| Oracle | Micros Compact Workstation 3 Firmware | 310 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.htmlExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-EscalExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-PrivileExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-OverfloExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-OverfExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2021/Feb/42Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2021/Jan/79ExploitMailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2024/Feb/3ExploitMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2021/01/26/3ExploitMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2021/01/27/1Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2021/01/27/2Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2021/02/15/1ExploitMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2021/09/14/2Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2024/01/30/6ExploitMailing List
- http://www.openwall.com/lists/oss-security/2024/01/30/8Mailing List
FAQ
What is CVE-2021-3156?
CVE-2021-3156 is a vulnerability with a CVSS score of 7.8 (HIGH). Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with...
How severe is CVE-2021-3156?
CVE-2021-3156 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3156?
Check the references section above for vendor advisories and patch information. Affected products include: Sudo Project Sudo, Fedoraproject Fedora, Debian Debian Linux, Netapp Active Iq Unified Manager, Netapp Cloud Backup.