Vulnerability Details : CVE-2021-3156

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
Vulnerability category: OverflowGain privilege
Published 2021-01-26 21:15:13
Updated 2022-09-03 03:40:36
Source MITRE
View at NVD,
At least one public exploit which can be used to exploit this vulnerability exists!
CVE-2021-3156 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Sudo Heap-Based Buffer Overflow Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Sudo contains an off-by-one error that can result in a heap-based buffer overflow, which allows for privilege escalation.
Added on 2022-04-06 Action due date 2022-04-27

Exploit prediction scoring system (EPSS) score for CVE-2021-3156

Probability of exploitation activity in the next 30 days: 96.58%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2021-3156

  • Sudo Heap-Based Buffer Overflow
    Disclosure Date: 2021-01-26
    First seen: 2021-03-12
    A heap based buffer overflow exists in the sudo command line utility that can be exploited by a local attacker to gain elevated privileges. The vulnerability was introduced in July of 2011 and affects version 1.8.2 through 1.8.31p2 as well as 1.9.0 through 1.9.5p1 in t

CVSS scores for CVE-2021-3156

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Source

CWE ids for CVE-2021-3156

  • A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
    Assigned by: (Primary)

References for CVE-2021-3156

Products affected by CVE-2021-3156

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to terms of use!