Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2019-18634
Severity
7.8HIGH
EPSS
87.5%
top 0.54%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 29
Latest updateMay 24
Description
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages2 packages
Also affects: Debian Linux 10.0, 8.0, 9.0
🔴Vulnerability Details
3💥Exploits & PoCs
2📋Vendor Advisories
4📄Research Papers
1💬Community
3Bugzilla
▶
Bugzilla▶
CVE-2019-18634 sudo: Stack based buffer overflow in when pwfeedback is enabled [fedora-all]↗2020-01-31