Уязвимость CVE-2021-3156: Информация

Описание

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

Важность: HIGH (7,8) Вектор: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Опубликовано: 27 января 2021 г.
Изменено: 4 февраля 2024 г.
Идентификатор типа ошибки: CWE-193

Исправленные пакеты

Имя пакета
Ветка
Исправлено в версии
Версия в репозитории
Errata ID
№ Задания
Состояние
sudosisyphus1.9.5p2-alt11.9.15p5-alt1ALT-PU-2021-1164-1265374Исправлено
sudop101.9.5p2-alt11.9.15p1-alt1ALT-PU-2021-1164-1265374Исправлено
sudop91.9.5p2-alt11.9.13p2-alt1ALT-PU-2021-1184-1265375Исправлено
sudop81.9.5p2-alt0.M80P.11.9.5p2-alt0.M80P.1ALT-PU-2021-1218-1265379Исправлено
sudoc10f11.9.5p2-alt11.9.15p1-alt1ALT-PU-2021-1164-1265374Исправлено
sudoc9f21.9.5p2-alt11.9.12p2-alt0.c9f2.1ALT-PU-2021-1174-1265385Исправлено

Ссылки на рекомендации, решения и инструменты

Ссылка
Ресурс
https://www.openwall.com/lists/oss-security/2021/01/26/3
  • Exploit
  • Mailing List
  • Third Party Advisory
https://www.sudo.ws/stable.html#1.9.5p2
  • Release Notes
  • Vendor Advisory
[oss-security] 20210126 Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)
  • Exploit
  • Mailing List
  • Third Party Advisory
GLSA-202101-33
  • Third Party Advisory
DSA-4839
  • Third Party Advisory
[oss-security] 20210127 Re: Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)
  • Mailing List
  • Third Party Advisory
[oss-security] 20210127 Re: Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)
  • Mailing List
  • Third Party Advisory
http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html
  • Third Party Advisory
  • VDB Entry
https://security.netapp.com/advisory/ntap-20210128-0001/
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20210128-0002/
  • Third Party Advisory
20210129 Sudo Privilege Escalation Vulnerability Affecting Cisco Products: January 2021
  • Third Party Advisory
http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html
  • Exploit
  • Third Party Advisory
  • VDB Entry
http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html
  • Exploit
  • Third Party Advisory
  • VDB Entry
VU#794544
  • Third Party Advisory
  • US Government Resource
http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html
  • Exploit
  • Third Party Advisory
  • VDB Entry
https://support.apple.com/kb/HT212177
  • Third Party Advisory
20210211 APPLE-SA-2021-02-09-1 macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update, and macOS Mojave 10.14.6 Security Update 2021-002
  • Mailing List
  • Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10348
  • Third Party Advisory
[oss-security] 20210215 Re: sudo: Ineffective NO_ROOT_MAILER and Baron Samedit
  • Exploit
  • Mailing List
  • Third Party Advisory
[debian-lts-announce] 20210126 [SECURITY] [DLA 2534-1] sudo security update
  • Mailing List
  • Third Party Advisory
20210126 Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)
  • Exploit
  • Mailing List
  • Third Party Advisory
https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability
  • Patch
  • Third Party Advisory
https://www.synology.com/security/advisory/Synology_SA_21_02
  • Third Party Advisory
N/A
  • Patch
  • Third Party Advisory
[oss-security] 20210914 Re: Oracle Solaris membership in the distros list
  • Mailing List
  • Patch
  • Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html
  • Patch
  • Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html
  • Patch
  • Third Party Advisory
FEDORA-2021-2cb63d912a
    FEDORA-2021-8840cbdccd
      [oss-security] 20240130 Re: CVE-2023-6246: Heap-based buffer overflow in the glibc's syslog()
        [oss-security] 20240130 CVE-2023-6246: Heap-based buffer overflow in the glibc's syslog()
          http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
            20240204 CVE-2023-6246: Heap-based buffer overflow in the glibc's syslog()
                1. Конфигурация 1

                  cpe:2.3:a:sudo_project:sudo:1.9.5:patch1:*:*:*:*:*:*

                  cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
                  Start including
                  1.9.0
                  End excliding
                  1.9.5

                  cpe:2.3:a:sudo_project:sudo:1.9.5:-:*:*:*:*:*:*

                  cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
                  Start including
                  1.8.2
                  End excliding
                  1.8.32

                  Конфигурация 2

                  cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

                  cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

                  Конфигурация 3

                  cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

                  cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

                  Конфигурация 4

                  cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

                  cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*

                  cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*

                  Конфигурация 5

                  cpe:2.3:a:mcafee:web_gateway:8.2.17:*:*:*:*:*:*:*

                  cpe:2.3:a:mcafee:web_gateway:9.2.8:*:*:*:*:*:*:*

                  cpe:2.3:a:mcafee:web_gateway:10.0.4:*:*:*:*:*:*:*

                  Конфигурация 6

                  cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*

                  cpe:2.3:a:synology:diskstation_manager_unified_controller:3.0:*:*:*:*:*:*:*

                  Конфигурация 7

                  cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*

                  Running on/with:
                  cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*

                  Конфигурация 8

                  cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*

                  Running on/with:
                  cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*

                  Конфигурация 9

                  cpe:2.3:a:beyondtrust:privilege_management_for_mac:*:*:*:*:*:*:*:*
                  End excliding
                  21.1.1

                  cpe:2.3:a:beyondtrust:privilege_management_for_unix\/linux:*:*:*:*:basic:*:*:*
                  End excliding
                  10.3.2-10

                  Конфигурация 10

                  cpe:2.3:o:oracle:micros_compact_workstation_3_firmware:310:*:*:*:*:*:*:*

                  Running on/with:
                  cpe:2.3:h:oracle:micros_compact_workstation_3:-:*:*:*:*:*:*:*

                  Конфигурация 11

                  cpe:2.3:o:oracle:micros_es400_firmware:*:*:*:*:*:*:*:*

                  Running on/with:
                  cpe:2.3:h:oracle:micros_es400:-:*:*:*:*:*:*:*

                  Конфигурация 12

                  cpe:2.3:o:oracle:micros_kitchen_display_system_firmware:210:*:*:*:*:*:*:*

                  Running on/with:
                  cpe:2.3:h:oracle:micros_kitchen_display_system:-:*:*:*:*:*:*:*

                  Конфигурация 13

                  cpe:2.3:o:oracle:micros_workstation_5a_firmware:5a:*:*:*:*:*:*:*

                  Running on/with:
                  cpe:2.3:h:oracle:micros_workstation_5a:-:*:*:*:*:*:*:*

                  Конфигурация 14

                  cpe:2.3:o:oracle:micros_workstation_6_firmware:*:*:*:*:*:*:*:*

                  Running on/with:
                  cpe:2.3:h:oracle:micros_workstation_6:-:*:*:*:*:*:*:*

                  Конфигурация 15

                  cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*
                  Start including
                  7.4.0
                  End including
                  7.7.1

                  cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*
                  Start including
                  10.4.0.1.0
                  End including
                  10.4.0.3.1

                  cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*
                  Start including
                  10.3.0.0.0
                  End including
                  10.3.0.2.1