Stack-based Buffer Overflow in Sudo when pwfeedback is Enabled
CVE-2019-18634

7.8HIGH

Key Information:

Vendor
Sudo Project
Status
Sudo
Vendor
CVE Published:
29 January 2020

Badges

👾 Exploit Exists🟡 Public PoC🟣 EPSS 87%

Summary

In versions of Sudo prior to 1.8.26, the pwfeedback feature can create a security risk when enabled in the /etc/sudoers file. This configuration allows users to cause a stack-based buffer overflow in the sudo process by supplying an excessively long string through standard input. Although pwfeedback is typically disabled by default in many distributions, it is enabled in certain environments like Linux Mint and elementary OS, posing significant risks if not properly managed by system administrators.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

87% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.