ID

VAR-202101-1926


CVE

CVE-2021-3156


TITLE

Sudo set_cmd() is vulnerable to heap-based buffer overflow

Trust: 0.8

sources: CERT/CC: VU#794544

DESCRIPTION

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. A heap-based overflow has been discovered in the set_cmd() function in sudo, which may allow a local attacker to execute commands with elevated administrator privileges.CVE-2021-3156 AffectedCVE-2021-3156 Affected. sudo has a heap-based buffer overflow due to the implementation of escaping special characters set in command arguments (CWE-122) Vulnerability exists. 2021 Year 2 Moon 5 As of the date macOS , AIX , Solaris It has been reported that it may also be affected by the virus, but it has not been confirmed by the finder. note that, 2021 Year 2 Moon 9 On the day Apple has released a security update to address this issue.A local third party can elevate privileges and execute commands with administrator privileges. Sensormatic Electronics Company ( Johnson Controls subsidiary) Illustra is a surveillance and security camera system. Illustra includes vulnerabilities related to boundary condition determination ( CWE-193 , CVE-2021-3156 ) exists.Installed in the product by a third party under certain conditions Linux Operating system administrator privileges can be obtained. Any local user (sudoers and non-sudoers) can exploit this flaw for root privilege escalation. For the stable distribution (buster), this problem has been fixed in version 1.8.27-1+deb10u3. We recommend that you upgrade your sudo packages. For the detailed security status of sudo please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sudo Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmAQWctfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Qr2w/5AfAZMSbKestTzvm22w+T5yReGOd2jYXO2SzdqdkIzOVXJ83RrbogkiyK d1ie47Csw51M8L5eT/kf48vkABPqT9S0dlRI7rQ2xbIDWIUcDpnFNCSclSGjI+Sd HqtaQQbR+MdSjGtC8vc8RVEOEQcVvoXrqDPaEniWjA4uTV7Iqj0P3EpH1XolVlZv lw4ZZ+VdDolxhm1QWp/NiMKUlDpv5RLs6jW0oQAKP1RZqMIX44TSEHil/NEs6VeN u5AFUwo5iwYRCUbgi2mB0GxV4CRyb0IN26pGsltYJsReFL1vCMiO9drGMk/WhlqB NGKeF5rLsMKaJCkBEcMntDG1XtFhXuyak2O4atL7H8CwhBZ81Axe+aAynn7IB99B qx3GLfRNSVKHQHBHWEOxqILCS+xWmvL6/uB6xMaAh5CXxhEgs9BIEiPonccmkzQ9 xj6Uw/aWv9ZOUu+Rwmp+bG/V8DKaFKegaQAy0HnhOZ11ruJJB/YicTXSsbxoLSEt hbd0bYAOrZBqcysH8Ed+R2tGxtjoWIDLcv3uUqmttxgd8E5YpGGngaYBleGCnB0s X3JDyd1pvBu7H0vR5k2bVNgm4qQ27jHmeNKRSpvUZv50mRX8NQyv/rrROwkUsVdI 1EnlHYz0E4BUfb15ECWLfN9BM/MyPhkdKadIrrd+zJEwq+KVcHo= =d9gQ -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202101-33 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: sudo: Multiple vulnerabilities Date: January 26, 2021 Bugs: #764986, #767364 ID: 202101-33 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been found in sudo, the worst of which could result in privilege escalation. Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-admin/sudo < 1.9.5_p2 >= 1.9.5_p2 Description ========== Multiple vulnerabilities have been discovered in sudo. Please review the CVE identifiers referenced below for details. Impact ===== Local users are able to gain unauthorized privileges on the system or determine the existence of files. Workaround ========= There is no known workaround at this time. Resolution ========= All sudo users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.9.5_p2" References ========= [ 1 ] CVE-2021-23239 https://nvd.nist.gov/vuln/detail/CVE-2021-23239 [ 2 ] CVE-2021-23240 https://nvd.nist.gov/vuln/detail/CVE-2021-23240 [ 3 ] CVE-2021-3156 https://nvd.nist.gov/vuln/detail/CVE-2021-3156 [ 4 ] Upstream advisory (CVE-2020-23240) https://www.sudo.ws/alerts/sudoedit_selinux.html [ 5 ] Upstream advisory (CVE-2021-3156) https://www.sudo.ws/alerts/unescape_overflow.html Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202101-33 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . 6 ELS) - i386, s390x, x86_64 3. ========================================================================== Ubuntu Security Notice USN-4705-2 January 27, 2021 sudo vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM - Ubuntu 12.04 ESM Summary: Several security issues were fixed in Sudo. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that Sudo incorrectly handled memory when parsing command lines. A local attacker could possibly use this issue to obtain unintended access to the administrator account. (CVE-2021-3156) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: sudo 1.8.9p5-1ubuntu1.5+esm6 Ubuntu 12.04 ESM: sudo 1.8.3p1-1ubuntu3.10 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: sudo security update Advisory ID: RHSA-2021:0226-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:0226 Issue date: 2021-01-26 CVE Names: CVE-2021-3156 ==================================================================== 1. Summary: An update for sudo is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.2) - x86_64 3. Description: The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: Heap buffer overflow in argument parsing (CVE-2021-3156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1917684 - CVE-2021-3156 sudo: Heap buffer overflow in argument parsing 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.2): Source: sudo-1.8.6p7-17.el7_2.3.src.rpm x86_64: sudo-1.8.6p7-17.el7_2.3.x86_64.rpm sudo-debuginfo-1.8.6p7-17.el7_2.3.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.2): x86_64: sudo-debuginfo-1.8.6p7-17.el7_2.3.i686.rpm sudo-debuginfo-1.8.6p7-17.el7_2.3.x86_64.rpm sudo-devel-1.8.6p7-17.el7_2.3.i686.rpm sudo-devel-1.8.6p7-17.el7_2.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-3156 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/RHSB-2021-002 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYBBuftzjgjWX9erEAQhMvw//bFNABGm9rbTjaz82JevupvwJHOPyb1lg sjTNW2x6YlUFH22bEgMgZSHmpuQ69Jca5yrLZkoaDQW/81S1haCvU7hSqE7kvDX9 /Q3GBJnV5ZRxPFI0abWNOV21PAuiSirR99EMB5Yq4o5FCzPkI5i+uIYLnrkdW2+J DPPXiIIt6kAj0k4A+tLRCLkyPbemHz8BIU2M9xUEvsAvs/YAv7lMce+lM7g2CAPx SXnsFejr9iNTTplf9mRGiANTP70ATsZc/6zhz8SiHuCDeF8QmnCQZg+xXVkG5jSY GgGy8zoNWOaTVkY+vPPP7hEo4Vt7QN+dvGn+13ELQQKdxqd68NSE4UcyX3FCEZ1y xS6TRGL2k6Uo2qETkzySx6mjAzlacxoMOwVKnGGjkN0Q0+D8AoluLVDUpaJHRnSU mVhDOoY6N9fRhbptzPoKxW/5hCb4ntxtM3extuU33kMSDp44xHX9oF0KzHbPuODq PuV2BF2wdfrImlEUo+yDioA39uRyaYfuc47xtLhzRutfSNyuv62IPiJmk/5bNgcR hI96vucAauFa82M9cRVXPn7mhEWikH7e6VY16hVPWzMSYBt46mKVrC0uzoaXjf9q CgHbYBhCpVCcpW2DemiTD1Eu4mV+ifNJDGoRUlWpcYdeSERN88esibKABJpGf6nH WsI4aXE4VzQ=mziT -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 8) - aarch64, ppc64le, s390x, x86_64 3

Trust: 3.78

sources: NVD: CVE-2021-3156 // CERT/CC: VU#794544 // JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // VULHUB: VHN-383931 // PACKETSTORM: 168983 // PACKETSTORM: 161139 // PACKETSTORM: 161152 // PACKETSTORM: 161141 // PACKETSTORM: 161163 // PACKETSTORM: 161136 // PACKETSTORM: 161138

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:netappmodel:ontap toolsscope:eqversion:9

Trust: 1.0

vendor:beyondtrustmodel:privilege management for unix\/linuxscope:ltversion:10.3.2-10

Trust: 1.0

vendor:netappmodel:oncommand unified manager core packagescope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:oraclemodel:micros kitchen display systemscope:eqversion:210

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:lteversion:10.4.0.3.1

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:gteversion:7.4.0

Trust: 1.0

vendor:oraclemodel:micros workstation 5ascope:eqversion:5a

Trust: 1.0

vendor:sudomodel:sudoscope:gteversion:1.9.0

Trust: 1.0

vendor:sudomodel:sudoscope:eqversion:1.9.5

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:lteversion:7.7.1

Trust: 1.0

vendor:sudomodel:sudoscope:ltversion:1.8.32

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:beyondtrustmodel:privilege management for macscope:ltversion:21.1.1

Trust: 1.0

vendor:oraclemodel:micros workstation 6scope:lteversion:655

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:sudomodel:sudoscope:gteversion:1.8.2

Trust: 1.0

vendor:mcafeemodel:web gatewayscope:eqversion:8.2.17

Trust: 1.0

vendor:synologymodel:vs960hdscope:eqversion: -

Trust: 1.0

vendor:synologymodel:skynasscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:micros workstation 6scope:gteversion:610

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:gteversion:10.4.0.1.0

Trust: 1.0

vendor:mcafeemodel:web gatewayscope:eqversion:9.2.8

Trust: 1.0

vendor:oraclemodel:micros es400scope:gteversion:400

Trust: 1.0

vendor:synologymodel:diskstation managerscope:eqversion:6.2

Trust: 1.0

vendor:sudomodel:sudoscope:ltversion:1.9.5

Trust: 1.0

vendor:netappmodel:hci management nodescope:eqversion: -

Trust: 1.0

vendor:synologymodel:diskstation manager unified controllerscope:eqversion:3.0

Trust: 1.0

vendor:oraclemodel:micros es400scope:lteversion:410

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:gteversion:10.3.0.0.0

Trust: 1.0

vendor:mcafeemodel:web gatewayscope:eqversion:10.0.4

Trust: 1.0

vendor:oraclemodel:micros compact workstation 3scope:eqversion:310

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:lteversion:10.3.0.2.1

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:sudomodel:sudoscope: - version: -

Trust: 0.8

vendor:sudomodel:sudoscope:eqversion:1.9.0 to 1.9.5p1

Trust: 0.8

vendor:sudomodel:sudoscope:eqversion: -

Trust: 0.8

vendor:sudomodel:sudoscope:eqversion:1.8.2 to 1.8.31p2

Trust: 0.8

vendor:sensormaticmodel:insightscope: - version: -

Trust: 0.8

vendor:sensormaticmodel:flex gen 2scope: - version: -

Trust: 0.8

vendor:sensormaticmodel:pro 2scope: - version: -

Trust: 0.8

vendor:sensormaticmodel:pro gen 3scope:eqversion:v2.8.0 all previous s

Trust: 0.8

sources: JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // NVD: CVE-2021-3156

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-3156
value: HIGH

Trust: 1.0

NVD: CVE-2021-3156
value: HIGH

Trust: 0.8

OTHER: JVNDB-2021-002344
value: HIGH

Trust: 0.8

VULHUB: VHN-383931
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-3156
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-383931
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-3156
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-3156
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

OTHER: JVNDB-2021-002344
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-383931 // JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // NVD: CVE-2021-3156

PROBLEMTYPE DATA

problemtype:CWE-193

Trust: 1.1

problemtype:Heap-based buffer overflow (CWE-122) [IPA evaluation ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

problemtype:Determination of boundary conditions (CWE-193) [ others ]

Trust: 0.8

sources: VULHUB: VHN-383931 // JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // NVD: CVE-2021-3156

THREAT TYPE

local

Trust: 0.2

sources: PACKETSTORM: 168983 // PACKETSTORM: 161163

TYPE

overflow, root

Trust: 0.5

sources: PACKETSTORM: 168983 // PACKETSTORM: 161139 // PACKETSTORM: 161141 // PACKETSTORM: 161136 // PACKETSTORM: 161138

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-383931

PATCH

title:Buffer overflow in command line unescaping Apple Apple Security Updatesurl:https://www.sudo.ws/alerts/unescape_overflow.html

Trust: 0.8

title:Product Security Advisory | JCI-PSA-2021-13 (( PDF )url:https://www.johnsoncontrols.com/-/media/jci/cyber-solutions/product-security-advisories/2021/jci-psa-2021-13.pdf?la=en&hash=FC6A4C7293ABA5697AC763F92E4256CA4F3D7B1D

Trust: 0.8

sources: JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344

EXTERNAL IDS

db:NVDid:CVE-2021-3156

Trust: 5.8

db:CERT/CCid:VU#794544

Trust: 2.7

db:JVNid:JVNVU96493147

Trust: 1.6

db:JVNid:JVNVU90511416

Trust: 1.6

db:ICS CERTid:ICSA-22-256-01

Trust: 1.6

db:PACKETSTORMid:161230

Trust: 1.1

db:PACKETSTORMid:161160

Trust: 1.1

db:PACKETSTORMid:161270

Trust: 1.1

db:PACKETSTORMid:161293

Trust: 1.1

db:MCAFEEid:SB10348

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/01/27/2

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/01/26/3

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/02/15/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/01/27/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2021/09/14/2

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2024/01/30/8

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2024/01/30/6

Trust: 1.0

db:PACKETSTORMid:176932

Trust: 1.0

db:JVNid:JVNVU99480250

Trust: 0.8

db:JVNid:JVNVU98963695

Trust: 0.8

db:JVNid:JVNVU92304019

Trust: 0.8

db:JVNid:JVNVU91343607

Trust: 0.8

db:JVNDBid:JVNDB-2021-001020

Trust: 0.8

db:JVNid:JVNVU96372273

Trust: 0.8

db:ICS CERTid:ICSA-21-245-01

Trust: 0.8

db:JVNDBid:JVNDB-2021-002344

Trust: 0.8

db:PACKETSTORMid:161163

Trust: 0.2

db:PACKETSTORMid:161141

Trust: 0.2

db:PACKETSTORMid:161152

Trust: 0.2

db:PACKETSTORMid:161138

Trust: 0.2

db:PACKETSTORMid:161139

Trust: 0.2

db:PACKETSTORMid:161136

Trust: 0.2

db:PACKETSTORMid:161143

Trust: 0.1

db:PACKETSTORMid:161144

Trust: 0.1

db:PACKETSTORMid:161140

Trust: 0.1

db:PACKETSTORMid:161142

Trust: 0.1

db:PACKETSTORMid:161272

Trust: 0.1

db:PACKETSTORMid:161398

Trust: 0.1

db:PACKETSTORMid:161135

Trust: 0.1

db:PACKETSTORMid:161281

Trust: 0.1

db:PACKETSTORMid:161137

Trust: 0.1

db:PACKETSTORMid:161145

Trust: 0.1

db:SEEBUGid:SSVID-99117

Trust: 0.1

db:VULHUBid:VHN-383931

Trust: 0.1

db:PACKETSTORMid:168983

Trust: 0.1

sources: CERT/CC: VU#794544 // VULHUB: VHN-383931 // JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // PACKETSTORM: 168983 // PACKETSTORM: 161139 // PACKETSTORM: 161152 // PACKETSTORM: 161141 // PACKETSTORM: 161163 // PACKETSTORM: 161136 // PACKETSTORM: 161138 // NVD: CVE-2021-3156

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2021-3156

Trust: 2.3

url:https://www.openwall.com/lists/oss-security/2021/01/26/3

Trust: 2.2

url:http://jvn.jp/vu/jvnvu90511416/index.html

Trust: 1.6

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-256-01

Trust: 1.6

url:https://security.gentoo.org/glsa/202101-33

Trust: 1.2

url:https://www.kb.cert.org/vuls/id/794544

Trust: 1.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sudo-privesc-jan2021-qnyqfcm

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20210128-0001/

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20210128-0002/

Trust: 1.1

url:https://support.apple.com/kb/ht212177

Trust: 1.1

url:https://www.sudo.ws/stable.html#1.9.5p2

Trust: 1.1

url:https://www.synology.com/security/advisory/synology_sa_21_02

Trust: 1.1

url:https://www.debian.org/security/2021/dsa-4839

Trust: 1.1

url:http://seclists.org/fulldisclosure/2021/jan/79

Trust: 1.1

url:http://seclists.org/fulldisclosure/2021/feb/42

Trust: 1.1

url:http://packetstormsecurity.com/files/161160/sudo-heap-based-buffer-overflow.html

Trust: 1.1

url:http://packetstormsecurity.com/files/161230/sudo-buffer-overflow-privilege-escalation.html

Trust: 1.1

url:http://packetstormsecurity.com/files/161270/sudo-1.9.5p1-buffer-overflow-privilege-escalation.html

Trust: 1.1

url:http://packetstormsecurity.com/files/161293/sudo-1.8.31p2-1.9.5p1-buffer-overflow.html

Trust: 1.1

url:https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability

Trust: 1.1

url:https://www.oracle.com//security-alerts/cpujul2021.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2021/01/msg00022.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/01/27/1

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/01/27/2

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/02/15/1

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2021/09/14/2

Trust: 1.1

url:http://packetstormsecurity.com/files/176932/glibc-syslog-heap-based-buffer-overflow.html

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/cala5ftxiqbrryua2zqnjxb6oqmaxeii/

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2024/01/30/8

Trust: 1.0

url:https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/lhxk6ico5aylgfk2tax5mzkuxtukwojy/

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2024/01/30/6

Trust: 1.0

url:http://seclists.org/fulldisclosure/2024/feb/3

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10348

Trust: 1.0

url:cve-2021-3156

Trust: 0.8

url:http://jvn.jp/cert/jvnvu96493147

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92304019/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98963695/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91343607/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99480250/

Trust: 0.8

url:https://www.jpcert.or.jp/at/2021/at210005.html

Trust: 0.8

url:https://kb.cert.org/vuls/id/794544

Trust: 0.8

url:https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit

Trust: 0.8

url:http://jvn.jp/cert/jvnvu96372273

Trust: 0.8

url:https://jvn.jp/vu/jvnvu96493147/

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-245-01

Trust: 0.8

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-002

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3156

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10348

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/lhxk6ico5aylgfk2tax5mzkuxtukwojy/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/cala5ftxiqbrryua2zqnjxb6oqmaxeii/

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/sudo

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0225

Trust: 0.1

url:https://www.sudo.ws/alerts/sudoedit_selinux.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23240

Trust: 0.1

url:https://www.sudo.ws/alerts/unescape_overflow.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23239

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0227

Trust: 0.1

url:https://usn.ubuntu.com/4705-2

Trust: 0.1

url:https://usn.ubuntu.com/4705-1

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0226

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0218

Trust: 0.1

sources: CERT/CC: VU#794544 // VULHUB: VHN-383931 // JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // PACKETSTORM: 168983 // PACKETSTORM: 161139 // PACKETSTORM: 161152 // PACKETSTORM: 161141 // PACKETSTORM: 161163 // PACKETSTORM: 161136 // PACKETSTORM: 161138 // NVD: CVE-2021-3156

CREDITS

This document was written by Timur Snoke.Statement Date:   February 15, 2021

Trust: 0.8

sources: CERT/CC: VU#794544

SOURCES

db:CERT/CCid:VU#794544
db:VULHUBid:VHN-383931
db:JVNDBid:JVNDB-2021-001020
db:JVNDBid:JVNDB-2021-002344
db:PACKETSTORMid:168983
db:PACKETSTORMid:161139
db:PACKETSTORMid:161152
db:PACKETSTORMid:161141
db:PACKETSTORMid:161163
db:PACKETSTORMid:161136
db:PACKETSTORMid:161138
db:NVDid:CVE-2021-3156

LAST UPDATE DATE

2025-01-03T19:57:00.025000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#794544date:2021-04-26T00:00:00
db:VULHUBid:VHN-383931date:2022-09-03T00:00:00
db:JVNDBid:JVNDB-2021-001020date:2022-09-15T05:47:00
db:JVNDBid:JVNDB-2021-002344date:2022-09-15T05:47:00
db:NVDid:CVE-2021-3156date:2024-11-21T06:21:01.083

SOURCES RELEASE DATE

db:CERT/CCid:VU#794544date:2021-02-04T00:00:00
db:VULHUBid:VHN-383931date:2021-01-26T00:00:00
db:JVNDBid:JVNDB-2021-001020date:2021-02-08T00:00:00
db:JVNDBid:JVNDB-2021-002344date:2021-09-06T00:00:00
db:PACKETSTORMid:168983date:2021-01-28T20:12:00
db:PACKETSTORMid:161139date:2021-01-27T14:06:12
db:PACKETSTORMid:161152date:2021-01-27T14:13:14
db:PACKETSTORMid:161141date:2021-01-27T14:06:28
db:PACKETSTORMid:161163date:2021-01-28T13:59:34
db:PACKETSTORMid:161136date:2021-01-27T14:05:42
db:PACKETSTORMid:161138date:2021-01-27T14:06:02
db:NVDid:CVE-2021-3156date:2021-01-26T21:15:12.987