Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Easier approach to exploit sudo 1.9.4 and later versions (ineffective NO_ROOT_MAILER bug) #5

Open
0xdea opened this issue Jan 31, 2021 · 2 comments

Comments

@0xdea
Copy link

0xdea commented Jan 31, 2021

A new approach was identified that should considerably simplify exploitation against sudo versions starting from 1.9.4:
https://seclists.org/oss-sec/2021/q1/88

It might be worth checking it out and implementing it in your exploit.

@blasty
Copy link
Owner

blasty commented Jan 31, 2021

Thanks for the headsup. Do we know which distros besides Debian Bullseye shipped a sudo (at some point) that was vulnerable to the ineffective NO_ROOT_MAILER hardening?

@0xdea
Copy link
Author

0xdea commented Jan 31, 2021

Based on a quick search of the coverage table provided by Qualys at the end of their blog post (https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit), I'd say that at least the following additional Linux distributions should be vulnerable:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants