Lucene search

K
nvd[email protected]NVD:CVE-2021-3156
HistoryJan 26, 2021 - 9:15 p.m.

CVE-2021-3156

2021-01-2621:15:12
CWE-193
web.nvd.nist.gov
3

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.97 High

EPSS

Percentile

99.7%

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via “sudoedit -s” and a command-line argument that ends with a single backslash character.

Affected configurations

NVD
Node
sudo_projectsudoRange1.8.21.8.32
OR
sudo_projectsudoRange1.9.01.9.5
OR
sudo_projectsudoMatch1.9.5-
OR
sudo_projectsudoMatch1.9.5patch1
Node
fedoraprojectfedoraMatch32
OR
fedoraprojectfedoraMatch33
Node
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
Node
netapphci_management_nodeMatch-
OR
netapponcommand_unified_manager_core_packageMatch-
OR
netappsolidfireMatch-
Node
mcafeeweb_gatewayMatch8.2.17
OR
mcafeeweb_gatewayMatch9.2.8
OR
mcafeeweb_gatewayMatch10.0.4
Node
synologydiskstation_managerMatch6.2
OR
synologydiskstation_manager_unified_controllerMatch3.0
Node
synologyskynasMatch-
AND
synologyskynas_firmwareMatch-
Node
synologyvs960hdMatch-
AND
synologyvs960hd_firmwareMatch-
Node
beyondtrustprivilege_management_for_macRange<21.1.1
OR
beyondtrustprivilege_management_for_unix\/linuxRange<10.3.2-10basic
Node
oraclemicros_compact_workstation_3Match-
AND
oraclemicros_compact_workstation_3_firmwareMatch310
Node
oraclemicros_es400Match-
AND
oraclemicros_es400_firmwareRange400410
Node
oraclemicros_kitchen_display_systemMatch-
AND
oraclemicros_kitchen_display_system_firmwareMatch210
Node
oraclemicros_workstation_5aMatch-
AND
oraclemicros_workstation_5a_firmwareMatch5a
Node
oraclemicros_workstation_6_firmwareRange610655
AND
oraclemicros_workstation_6Match-
Node
oraclecommunications_performance_intelligence_centerRange10.3.0.0.010.3.0.2.1
OR
oraclecommunications_performance_intelligence_centerRange10.4.0.1.010.4.0.3.1
OR
oracletekelec_platform_distributionRange7.4.07.7.1

References

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.97 High

EPSS

Percentile

99.7%