Sudo is a powerful utility that is remembered for most if not all Unix-and Linux-based OSes which allows a permitted user to execute a command as the superuser or another user, as specified by the security policy. This paper covers Unix like systems which are vulnerable to heap-based buffer overflow sudo vulnerability. This vulnerability was hidden for around the last ten years, affecting unpatched versions of sudo programs from 1.8.2-1.8.31p2 and 1.9.0-1.9.5p1.
Key Pointers:
- Understanding the history of this vulnerability and how it works
- Understanding the severity of this vulnerability with CVSS score of 7.8
- Mapping the vulnerable sudo versions and understanding the scope of impact
- Preparing the prerequisites to set up the lab and demonstrate the exploitation
- Learning about the mitigations to patch this vulnerability