Stack-based Buffer Overflow in Sudo when pwfeedback is Enabled
CVE-2019-18634
Key Information:
- Vendor
- Sudo Project
- Status
- Sudo
- Vendor
- CVE Published:
- 29 January 2020
Badges
Summary
In versions of Sudo prior to 1.8.26, the pwfeedback feature can create a security risk when enabled in the /etc/sudoers file. This configuration allows users to cause a stack-based buffer overflow in the sudo process by supplying an excessively long string through standard input. Although pwfeedback is typically disabled by default in many distributions, it is enabled in certain environments like Linux Mint and elementary OS, posing significant risks if not properly managed by system administrators.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
87% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved