7.8

CVE-2021-3156

Warning
Exploit

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

Data is provided by the National Vulnerability Database (NVD)
Sudo ProjectSudo Version >= 1.8.2 < 1.8.32
Sudo ProjectSudo Version >= 1.9.0 < 1.9.5
Sudo ProjectSudo Version1.9.5 Update-
Sudo ProjectSudo Version1.9.5 Updatepatch1
FedoraprojectFedora Version32
FedoraprojectFedora Version33
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
NetappActive Iq Unified Manager Version- SwPlatformvmware_vsphere
NetappCloud Backup Version-
NetappOntap Tools Version9 SwPlatformvmware_vsphere
NetappSolidfire Version-
McafeeWeb Gateway Version8.2.17
McafeeWeb Gateway Version9.2.8
McafeeWeb Gateway Version10.0.4
SynologyDiskstation Manager Version6.2
SynologySkynas Firmware Version-
   SynologySkynas Version-
SynologyVs960hd Firmware Version-
   SynologyVs960hd Version-
OracleMicros Es400 Firmware Version >= 400 <= 410
   OracleMicros Es400 Version-
OracleMicros Workstation 6 Firmware Version >= 610 <= 655
   OracleMicros Workstation 6 Version-
OracleCommunications Performance Intelligence Center Version >= 10.3.0.0.0 <= 10.3.0.2.1
OracleCommunications Performance Intelligence Center Version >= 10.4.0.1.0 <= 10.4.0.3.1
OracleTekelec Platform Distribution Version >= 7.4.0 <= 7.7.1

06.04.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Sudo Heap-Based Buffer Overflow Vulnerability

Vulnerability

Sudo contains an off-by-one error that can result in a heap-based buffer overflow, which allows for privilege escalation.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 92.26% 0.997
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-193 Off-by-one Error

A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.

http://www.openwall.com/lists/oss-security/2021/09/14/2
Patch
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2021/Feb/42
Third Party Advisory
Mailing List
http://seclists.org/fulldisclosure/2021/Jan/79
Third Party Advisory
Exploit
Mailing List
http://seclists.org/fulldisclosure/2024/Feb/3
Third Party Advisory
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2021/01/26/3
Third Party Advisory
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2021/02/15/1
Third Party Advisory
Exploit
Mailing List
https://www.kb.cert.org/vuls/id/794544
Third Party Advisory
US Government Resource
https://www.openwall.com/lists/oss-security/2021/01/26/3
Third Party Advisory
Exploit
Mailing List