Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-18634 PoC — Sudo 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Sudo 缓冲区错误漏洞 (CVE-2019-18634)
Description:Sudo是一款使用于类Unix系统的,允许用户通过安全的方式使用特殊的权限执行命令的程序。 Sudo 1.8.26之前版本中存在缓冲区错误漏洞,该漏洞源于程序没有正确检查边界。本地攻击者可借助特制字符串利用该漏洞在系统上执行任意代码。
Description
A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc
Readme
# CVE-2019-18634

**:warning: This code has only been tested on sudo 1.8.25. The bug impacts <1.8.30, but there are differences in character handling that prevent this PoC from executing (this does not mitigate the exploitability of the bug). See [#1](https://github.com/Plazmaz/CVE-2019-18634/issues/1) :warning:**  
  
Functional exploit for CVE-2019-18634, a heap buffer overflow that leads to privilege escalation on sudo <=1.8.30 if pwfeedback is enabled.  
[https://dylankatz.com/Analysis-of-CVE-2019-18634/](https://dylankatz.com/Analysis-of-CVE-2019-18634/)  
This repo contains both a single-file script (`self-contained.sh`), and the scripts used to generate it (under `src`)  
Thanks to yuu and Anonymous_ for help in developing this exploit and these scripts.  
Credit to Joe Vennix and William Bowling for the original discovery of the bug and the information on exploiting through 1.8.30.  
File Snapshot

[4.0K] /data/pocs/1dca040d9f0fa9c4039abb41df6b44f7a4336031 ├── [ 905] README.md ├── [1.3K] self-contained.sh └── [4.0K] src ├── [ 554] exec.c ├── [ 346] run.sh └── [ 440] xpl.pl 1 directory, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.