CVE-2021-3156

KEV
Published: Gen 26, 2021 Last Modified: Nov 10, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,8
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 7,2
Access Vector: local
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via 'sudoedit -s' and a command-line argument that ends with a single backslash character.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9224
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

193

Off-by-one Error

Draft
Common Consequences
Security Scopes Affected:
Availability Integrity Confidentiality Access Control
Potential Impacts:
Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Dos: Instability Modify Memory Execute Unauthorized Code Or Commands Bypass Protection Mechanism
Applicable Platforms
Languages: C, Not Language-Specific
View CWE Details
Exploit

Sudo 1.9.5p1 - 'Baron Samedit ' Heap-Based Buffer …

Sudo 1.9.5p1 - 'Baron Samedit ' Heap-Based Buffer Overflow Privilege Escalation (1)

View Exploit Code →
Exploit

Sudo 1.9.5p1 - 'Baron Samedit ' Heap-Based Buffer …

Sudo 1.9.5p1 - 'Baron Samedit ' Heap-Based Buffer Overflow Privilege Escalation (2)

View Exploit Code →
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Oncommand Unified Manager Core Package by Netapp

cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Micros Compact Workstation 3 Firmware by Oracle

cpe:2.3:o:oracle:micros_compact_workstation_3_firmware:310:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Web Gateway by Mcafee

cpe:2.3:a:mcafee:web_gateway:9.2.8:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Tekelec Platform Distribution by Oracle

Version Range Affected
From 7.4.0 (inclusive)
To 7.7.1 (inclusive)
cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Communications Performance Intelligence Center by Oracle

Version Range Affected
From 10.4.0.1.0 (inclusive)
To 10.4.0.3.1 (inclusive)
cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Fedora by Fedoraproject

cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Privilege Management For Mac by Beyondtrust

Version Range Affected
To 21.1.1 (exclusive)
cpe:2.3:a:beyondtrust:privilege_management_for_mac:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Sudo by Sudo Project

Version Range Affected
From 1.9.0 (inclusive)
To 1.9.5 (exclusive)
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Active Iq Unified Manager by Netapp

cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Sudo by Sudo Project

cpe:2.3:a:sudo_project:sudo:1.9.5:patch1:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Web Gateway by Mcafee

cpe:2.3:a:mcafee:web_gateway:10.0.4:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Vs960Hd Firmware by Synology

cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Sudo by Sudo Project

cpe:2.3:a:sudo_project:sudo:1.9.5:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Privilege Management For Unix\/Linux by Beyondtrust

Version Range Affected
To 10.3.2-10 (exclusive)
cpe:2.3:a:beyondtrust:privilege_management_for_unix\/linux:*:*:*:*:basic:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Skynas Firmware by Synology

cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Micros Kitchen Display System Firmware by Oracle

cpe:2.3:o:oracle:micros_kitchen_display_system_firmware:210:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Cloud Backup by Netapp

cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Communications Performance Intelligence Center by Oracle

Version Range Affected
From 10.3.0.0.0 (inclusive)
To 10.3.0.2.1 (inclusive)
cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Micros Es400 Firmware by Oracle

Version Range Affected
From 400 (inclusive)
To 410 (inclusive)
cpe:2.3:o:oracle:micros_es400_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Hci Management Node by Netapp

cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Solidfire by Netapp

cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Ontap Tools by Netapp

cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Micros Workstation 5A Firmware by Oracle

cpe:2.3:o:oracle:micros_workstation_5a_firmware:5a:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Web Gateway by Mcafee

cpe:2.3:a:mcafee:web_gateway:8.2.17:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Micros Workstation 6 Firmware by Oracle

Version Range Affected
From 610 (inclusive)
To 655 (inclusive)
cpe:2.3:o:oracle:micros_workstation_6_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Diskstation Manager by Synology

cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Diskstation Manager Unified Controller by Synology

cpe:2.3:a:synology:diskstation_manager_unified_controller:3.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Fedora by Fedoraproject

cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Ontap Select Deploy Administration Utility by Netapp

cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Sudo by Sudo Project

Version Range Affected
From 1.8.2 (inclusive)
To 1.8.32 (exclusive)
cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021…
http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html
http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Esca…
http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privil…
http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overfl…
http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Over…
http://seclists.org/fulldisclosure/2021/Feb/42
http://seclists.org/fulldisclosure/2021/Jan/79
http://seclists.org/fulldisclosure/2024/Feb/3
https://kc.mcafee.com/corporate/index?page=content&id=SB10348
https://lists.debian.org/debian-lts-announce/2021/01/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://security.gentoo.org/glsa/202101-33
https://security.netapp.com/advisory/ntap-20210128-0001/
https://security.netapp.com/advisory/ntap-20210128-0002/
https://support.apple.com/kb/HT212177
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-…
https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-f…
https://www.debian.org/security/2021/dsa-4839
https://www.kb.cert.org/vuls/id/794544
https://www.openwall.com/lists/oss-security/2021/01/26/3
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.sudo.ws/stable.html#1.9.5p2
https://www.synology.com/security/advisory/Synology_SA_21_02
http://www.openwall.com/lists/oss-security/2021/01/26/3
http://www.openwall.com/lists/oss-security/2021/01/27/1
http://www.openwall.com/lists/oss-security/2021/01/27/2
http://www.openwall.com/lists/oss-security/2021/02/15/1
http://www.openwall.com/lists/oss-security/2021/09/14/2
http://www.openwall.com/lists/oss-security/2024/01/30/6
http://www.openwall.com/lists/oss-security/2024/01/30/8
http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html
http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Esca…
http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privil…
http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overfl…
http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Over…
http://seclists.org/fulldisclosure/2021/Feb/42
http://seclists.org/fulldisclosure/2021/Jan/79
http://seclists.org/fulldisclosure/2024/Feb/3
https://kc.mcafee.com/corporate/index?page=content&id=SB10348
https://lists.debian.org/debian-lts-announce/2021/01/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapr…
https://security.gentoo.org/glsa/202101-33
https://security.netapp.com/advisory/ntap-20210128-0001/
https://security.netapp.com/advisory/ntap-20210128-0002/
https://support.apple.com/kb/HT212177
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-…
https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-f…
https://www.debian.org/security/2021/dsa-4839
https://www.kb.cert.org/vuls/id/794544
https://www.openwall.com/lists/oss-security/2021/01/26/3
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.sudo.ws/stable.html#1.9.5p2
https://www.synology.com/security/advisory/Synology_SA_21_02
https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156
http://www.openwall.com/lists/oss-security/2021/01/26/3
http://www.openwall.com/lists/oss-security/2021/01/27/1
http://www.openwall.com/lists/oss-security/2021/01/27/2
http://www.openwall.com/lists/oss-security/2021/02/15/1
http://www.openwall.com/lists/oss-security/2021/09/14/2
http://www.openwall.com/lists/oss-security/2024/01/30/6
http://www.openwall.com/lists/oss-security/2024/01/30/8