Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3156
HistoryJan 26, 2021 - 12:00 a.m.

CVE-2021-3156

2021-01-2600:00:00
ubuntu.com
ubuntu.com
34

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.971 High

EPSS

Percentile

99.8%

Sudo before 1.9.5p2 contains an off-by-one error that can result in a
heap-based buffer overflow, which allows privilege escalation to root via
“sudoedit -s” and a command-line argument that ends with a single backslash
character.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchsudo< 1.8.21p2-3ubuntu1.4UNKNOWN
ubuntu20.04noarchsudo< 1.8.31-1ubuntu1.2UNKNOWN
ubuntu20.10noarchsudo< 1.9.1-1ubuntu1.1UNKNOWN
ubuntu14.04noarchsudo< 1.8.9p5-1ubuntu1.5+esm6) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchsudo< 1.8.16-0ubuntu1.10UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.971 High

EPSS

Percentile

99.8%