Lucene search

K
ibmIBM79B141AAF1C51913A9CB5960F462DFAB85217C7BAD6F6CB8BCD729FACEEEBD51
HistoryApr 12, 2021 - 10:48 p.m.

Security Bulletin: Sudo as used by IBM QRadar SIEM is vulnerable to arbitrary code execution

2021-04-1222:48:01
www.ibm.com
19

0.97 High

EPSS

Percentile

99.7%

Summary

Sudo as used by IBM QRadar SIEM is vulnerable to arbitrary code execution

Vulnerability Details

CVEID:CVE-2021-3156
**DESCRIPTION:**Sudo is vulnerable to a heap-based buffer overflow, caused by improper bounds checking when parsing command line arguments. By sending an “sudoedit -s” and a command-line argument that ends with a single backslash character, a local attacker could overflow a buffer and execute arbitrary code on the system with root privileges. This vulnerability is also known as Baron Samedit.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/195658 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM QRadar 7.3.0 to 7.3.3 Patch 7

IBM QRadar 7.4.0 to 7.4.2 Patch 2

Remediation/Fixes

QRadar / QRM / QVM / QRIF / QNI 7.3.3 Patch 7 IF2
QRadar / QRM / QVM / QRIF / QNI 7.4.2 Patch 3

Workarounds and Mitigations

None