First published: Tue Jan 19 2021(Updated: )
A heap-based buffer overflow was found in the way sudo parses command line arguments. As per the researcher this vulnerability: - is exploitable by any local user (normal users and system users, sudoers and non-sudoers), without authentication (i.e., the attacker does not need to know the user's password); - was introduced in July 2011 (commit 8255ed69), and affects all legacy versions from 1.8.2 to 1.8.31p2 and all stable versions from 1.9.0 to 1.9.5p1, in their default configuration. This could lead to privilege escalation.
Credit: cve@mitre.org Qualys cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/sudo | 1.8.27-1+deb10u3 1.8.27-1+deb10u5 1.9.5p2-3+deb11u1 1.9.13p3-1+deb12u1 1.9.14p2-1 | |
Apple macOS Big Sur | <11.2.1 | 11.2.1 |
Apple macOS Catalina Supplemental Update | <10.15.7 | 10.15.7 |
Apple macOS Mojave | <10.14.6 | 10.14.6 |
Sudo Sudo | ||
Sudo Project Sudo | >=1.8.2<1.8.32 | |
Sudo Project Sudo | >=1.9.0<1.9.5 | |
Sudo Project Sudo | =1.9.5 | |
Sudo Project Sudo | =1.9.5-patch1 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Netapp Hci Management Node | ||
NetApp OnCommand Unified Manager Core Package | ||
Netapp Solidfire | ||
McAfee Web Gateway | =8.2.17 | |
McAfee Web Gateway | =9.2.8 | |
McAfee Web Gateway | =10.0.4 | |
Synology DiskStation Manager | =6.2 | |
Synology Diskstation Manager Unified Controller | =3.0 | |
Synology Skynas Firmware | ||
Synology Skynas | ||
Synology Vs960hd Firmware | ||
Synology Vs960hd | ||
BeyondTrust Privilege Management for Mac | <21.1.1 | |
Beyondtrust Privilege Management For Unix\/linux | <10.3.2-10 | |
Oracle Micros Compact Workstation 3 Firmware | =310 | |
Oracle Micros Compact Workstation 3 | ||
Oracle Micros Es400 Firmware | >=400<=410 | |
Oracle Micros Es400 | ||
Oracle Micros Kitchen Display System Firmware | =210 | |
Oracle Micros Kitchen Display System | ||
Oracle Micros Workstation 5a Firmware | =5a | |
Oracle Micros Workstation 5a | ||
Oracle Micros Workstation 6 Firmware | >=610<=655 | |
Oracle Micros Workstation 6 | ||
Oracle Communications Performance Intelligence Center | >=10.3.0.0.0<=10.3.0.2.1 | |
Oracle Communications Performance Intelligence Center | >=10.4.0.1.0<=10.4.0.3.1 | |
Oracle Tekelec Platform Distribution | >=7.4.0<=7.7.1 | |
redhat/sudo | <1.9.5 | 1.9.5 |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Cloud Backup | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Ontap Tools Vmware Vsphere | =9 | |
All of | ||
Synology Skynas Firmware | ||
Synology Skynas | ||
All of | ||
Synology Vs960hd Firmware | ||
Synology Vs960hd | ||
All of | ||
Oracle Micros Compact Workstation 3 Firmware | =310 | |
Oracle Micros Compact Workstation 3 | ||
All of | ||
Oracle Micros Es400 Firmware | >=400<=410 | |
Oracle Micros Es400 | ||
All of | ||
Oracle Micros Kitchen Display System Firmware | =210 | |
Oracle Micros Kitchen Display System | ||
All of | ||
Oracle Micros Workstation 5a Firmware | =5a | |
Oracle Micros Workstation 5a | ||
All of | ||
Oracle Micros Workstation 6 Firmware | >=610<=655 | |
Oracle Micros Workstation 6 | ||
<=10.5 | ||
<=10.6 | ||
<=11.0 | ||
<=11.1 | ||
<=11.2 | ||
<=11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this vulnerability is CVE-2021-3156.
The title of this vulnerability is Sudo Heap-Based Buffer Overflow Vulnerability.
The description of this vulnerability is that Sudo contains an off-by-one error that can result in a heap-based buffer overflow, which allows for privilege escalation.
The affected software includes Sudo, macOS Big Sur (up to version 11.2.1), macOS Catalina Supplemental Update (up to version 10.15.7), and macOS Mojave (up to version 10.14.6).
More information about this vulnerability can be found at the following reference: [https://support.apple.com/en-us/HT212177](https://support.apple.com/en-us/HT212177).