# N/A
## 概述
在 Sudo 1.8.26 之前的版本中,如果 `/etc/sudoers` 文件中启用了 `pwfeedback`,用户可以触发特权 `sudo` 进程中的堆栈溢出。
## 影响版本
Sudo 1.8.26 之前的版本
## 细节
- 当 `/etc/sudoers` 文件中启用了 `pwfeedback` 选项时,攻击者可以通过向 `tgetpass.c` 文件中的 `getln()` 函数传递一个很长的字符串来触发堆栈溢出。
- `pwfeedback` 是 Linux Mint 和 elementary OS 的默认设置,但在上游和其他许多软件包中默认未启用,只有经过管理员设置后才会启用。
## 影响
攻击者可以利用此漏洞触发堆栈溢出,可能导致特权提升或其他安全问题。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc | https://github.com/Plazmaz/CVE-2019-18634 | POC详情 |
| 2 | Proof of Concept for CVE-2019-18634 | https://github.com/saleemrashid/sudo-cve-2019-18634 | POC详情 |
| 3 | An Python Exploit for Sudo vulnerability CVE-2019-18634 | https://github.com/N1et/CVE-2019-18634 | POC详情 |
| 4 | exploit for sudo CVE-2019-18634 | https://github.com/ptef/CVE-2019-18634 | POC详情 |
| 5 | None | https://github.com/edsonjt81/sudo-cve-2019-18634 | POC详情 |
| 6 | exploit | https://github.com/Y3A/CVE-2019-18634 | POC详情 |
| 7 | My n-day exploit for CVE-2019-18634 (local privilege escalation) | https://github.com/aesophor/CVE-2019-18634 | POC详情 |
| 8 | None | https://github.com/TheJoyOfHacking/saleemrashid-sudo-cve-2019-18634 | POC详情 |
| 9 | None | https://github.com/DDayLuong/CVE-2019-18634 | POC详情 |
| 10 | A reproduction of CVE-2019-18634, sudo privilege escalation with buffer overflow. | https://github.com/chanbakjsd/CVE-2019-18634 | POC详情 |
| 11 | exploit | https://github.com/paras1te-x/CVE-2019-18634 | POC详情 |
| 12 | This repo contains both the exploit and the explaination of how this vulnerability is exploited | https://github.com/l0w3/CVE-2019-18634 | POC详情 |
| 13 | None | https://github.com/ngyinkit/cve-2019-18634 | POC详情 |
| 14 | None | https://github.com/letsr00t/-CVE-2019-18634-sudo-pwfeedback | POC详情 |
| 15 | analysis of the sudo buffer overflow affect sudo version <1.8.26 and how to use GCC to compile publicly availible exploits | https://github.com/CyrusRazavi/CVE-2019-18634- | POC详情 |
| 16 | analysis of the sudo buffer overflow affect sudo version <1.8.26 and how to use GCC to compile publicly availible exploits | https://github.com/CyrusRazavi/CVE-2019-18634-writeup | POC详情 |
标题: USN-4263-1: Sudo vulnerability | Ubuntu security notices | Ubuntu -- 🔗来源链接
标签:vendor-advisoryx_refsource_UBUNTU
神龙速读:
- **Security Notice Number**:
- USN-4263-1
- **Vulnerability**:
- Sudo (CVE-2019-18634)
- **Release date**:
- February 3, 2020
- **Description of the problem**:
- Joe Vennix discovered that Sudo incorrectly handled memory operations when the pwfeedback option is enabled. A local attacker could possibly use this flaw to obtain unintended access to the administrator account.
- **Software updates**
- To solve the problem, it is recommended to update the following versions of the Sudo software package:
- Ubuntu 19.10 (eoan)
- sudo - 1.8.27-1ubuntu4.1
- sudo-ldap - 1.8.27-1ubuntu4.3
- Ubuntu 18.04 LTS (bionic)
- sudo - 1.8.21p2-3ubuntu1.2
- sudo-ldap - 1.8.21p2-3ubuntu1.2
- Ubuntu 16.04 LTS (xenial)
- sudo - 1.8.16-0ubuntu1.9
- sudo-ldap - 1.8.16-0ubuntu1.9
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.