支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: 1dca040d9f0fa9c4039abb41df6b44f7a4336031

来源
关联漏洞
标题:Sudo 缓冲区错误漏洞 (CVE-2019-18634)
描述:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.8.26之前版本中存在缓冲区错误漏洞,该漏洞源于程序没有正确检查边界。本地攻击者可借助特制字符串利用该漏洞在系统上执行任意代码。
描述
A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc
介绍
# CVE-2019-18634

**:warning: This code has only been tested on sudo 1.8.25. The bug impacts <1.8.30, but there are differences in character handling that prevent this PoC from executing (this does not mitigate the exploitability of the bug). See [#1](https://github.com/Plazmaz/CVE-2019-18634/issues/1) :warning:**  
  
Functional exploit for CVE-2019-18634, a heap buffer overflow that leads to privilege escalation on sudo <=1.8.30 if pwfeedback is enabled.  
[https://dylankatz.com/Analysis-of-CVE-2019-18634/](https://dylankatz.com/Analysis-of-CVE-2019-18634/)  
This repo contains both a single-file script (`self-contained.sh`), and the scripts used to generate it (under `src`)  
Thanks to yuu and Anonymous_ for help in developing this exploit and these scripts.  
Credit to Joe Vennix and William Bowling for the original discovery of the bug and the information on exploiting through 1.8.30.  
文件快照

[4.0K] /data/pocs/1dca040d9f0fa9c4039abb41df6b44f7a4336031 ├── [ 905] README.md ├── [1.3K] self-contained.sh └── [4.0K] src ├── [ 554] exec.c ├── [ 346] run.sh └── [ 440] xpl.pl 1 directory, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。