Linux Sudo Privilege Escalation (Out-of-bounds Write)

high Nessus Plugin ID 146799

Synopsis

The remote Linux distribution host is missing a security-related update.

Description

Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via 'sudoedit -s' and a command-line argument that ends with a single backslash character.

Solution

n/a.

See Also

https://www.sudo.ws/alerts/unescape_overflow.html

Plugin Details

Severity: High

ID: 146799

File Name: linux_cve-2021-3156.nbin

Version: 1.157

Type: local

Family: Misc.

Published: 2/24/2021

Updated: 11/6/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-3156

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:linux:linux_kernel

Required KB Items: Host/local_checks_enabled, Host/Linux

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/23/2021

Vulnerability Publication Date: 1/26/2021

CISA Known Exploited Vulnerability Due Dates: 4/27/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Sudo Heap-Based Buffer Overflow)

Reference Information

CVE: CVE-2021-3156