4.6
CVSSv2

CVE-2019-18634

Published: 29/01/2020 Updated: 07/11/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 417
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Sudo prior to 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sudo project sudo

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #950371 sudo: CVE-2019-18634 Package: src:sudo; Maintainer for src:sudo is Bdale Garbee <bdale@gagcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 31 Jan 2020 20:36:01 UTC Severity: important Tags: security, upstream Found in versions sudo/1827-1, sudo/1819p1-21, ...
Joe Vennix discovered a stack-based buffer overflow vulnerability in sudo, a program designed to provide limited super user privileges to specific users, triggerable when configured with the pwfeedback option enabled An unprivileged user can take advantage of this flaw to obtain full root privileges Details can be found in the upstream advisory a ...
Sudo could allow unintended access to the administrator account ...
Sudo could allow unintended access to the administrator account ...
Synopsis Important: sudo security update Type/Severity Security Advisory: Important Topic An update for sudo is now available for Red Hat Enterprise Linux 80 Update Services for SAP SolutionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Sco ...
Synopsis Important: sudo security update Type/Severity Security Advisory: Important Topic An update for sudo is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which ...
Synopsis Important: sudo security update Type/Severity Security Advisory: Important Topic An update for sudo is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which ...
Synopsis Important: sudo security update Type/Severity Security Advisory: Important Topic An update for sudo is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which ...
In Sudo before 1826, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator) The attacker nee ...
In Sudo before 1826, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator) The attacker nee ...
A flaw was found in the Sudo before version 1831 application when the ’pwfeedback' option is set to true on the sudoers file An authenticated user can use this vulnerability to trigger a stack-based buffer overflow under certain conditions even without Sudo privileges The buffer overflow may allow an attacker to expose or corrupt memory infor ...

Exploits

Sudo version 1825p suffers from a buffer overflow vulnerability ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled <!--X-Subject-Header-End--> <!--X-Head-of-Message--> ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From ...

Github Repositories

Linux Privilege Escalation Cheat Sheet Initial Enumeration System Enumeration hostname uname -a cat /proc/version cat /etc/issue lscpu Process Enumeration ps aux ps aux | grep root User Enumeration whoami id sudo -l cat /etc/passwd cat /etc/passwd | cut -d : -f 1 cat /etc/shadow cat /etc/group

Proof of Concept for CVE-2019-18634

CVE-2019-18634 wwwsudows/alerts/pwfeedbackhtml nvdnistgov/vuln/detail/CVE-2019-18634 Credit to Joe Vennix from Apple Information Security for finding the bug

exploit for sudo CVE-2019-18634

CVE-2019-18634 I wrote this exploit for Linx Mint 191 so probably it'll not work for other distributions If you're exploint a real environment I recommend you to use Salem Rashid's exploit version, which has the proper offsets for other sudo versions This is just an exploit for this specfic OS, so perhaps not a full reliable exploit for other distros Please c

Linux_Priviledge_Escalation By Shivani Bhavsar You got everything about Escalting Linux Privilege Overview How to enumerate linux systems manually as well as with tools Privilege Escalation Techniques: Kernel Exploits Password Hunting File Permissions Sudo Shell Escaping intended functionality, LD_PRELOAD CVE-2019-14287 CVE-2019-18634 SUID Shared Object Injectio

CVE-2019-18634 wwwsudows/alerts/pwfeedbackhtml nvdnistgov/vuln/detail/CVE-2019-18634 Credit to Joe Vennix from Apple Information Security for finding the bug

Compilation of Resources for TCM's Linux Privilege Escalation course

Linux-Privilege-Escalation-Resources Compilation of Resources for TCM's Linux Privilege Escalation course General Links TCM Website: wwwthecybermentorcom/ TCM-Sec: tcm-seccom/ Course: wwwudemycom/course/linux-privilege-escalation-for-beginners/ (udemy) academytcm-seccom/p/linux-privilege-escalation (tcm academy) Twitch: www

Linux-Privilege-Escalation Compilation of Resources for Linux Privilege Escalation course General Links Course: wwwudemycom/course/linux-privilege-escalation-for-beginners/ (udemy) academytcm-seccom/p/linux-privilege-escalation (tcm academy) TryHackMe: tryhackmecom/ LinuxPrivEscArena: tryhackmecom/roo

An Python Exploit for Sudo vulnerability CVE-2019-18634

SUDO VULNERABILITY CVE-2019-18634 Exploit developed in Python for Sudo vulnerability BSS overflow (CVE-2019-18634) For studying reasons USE python runpy Credits githubcom/Plazmaz/CVE-2019-18634 bestwingme/CVE-2019-18634-analysishtml

Zero2H4x0r This is not meant to serve as an exhaustive summary of the content presented by Heath Adams in the Practical Ethical Hacking Course Rather, it's a compilation of my personal notes and reflections from my pursuit of obtaining my PNPT I typically maintain my notes locally within my Obsidian vault and periodically upload them here in batches While these notes ma

Sudo Password Feedback Based Buffer Overflow Attack

CVE-2019-18634 wwwsudows/alerts/pwfeedbackhtml nvdnistgov/vuln/detail/CVE-2019-18634 Credit to Joe Vennix from Apple Information Security for finding the bug

exploit for sudo CVE-2019-18634

CVE-2019-18634 I wrote this exploit for Linx Mint 191 so probably it'll not work for other distributions If you're exploint a real environment I recommend you to use Salem Rashid's exploit version, which has the proper offsets for other sudo versions This is just an exploit for this specfic OS, so perhaps not a full reliable exploit for other distros Please c

A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc

CVE-2019-18634 ⚠️ This code has only been tested on sudo 1825 The bug impacts &lt;1830, but there are differences in character handling that prevent this PoC from executing (this does not mitigate the exploitability of the bug) See #1 ⚠️ Functional exploit for CVE-2019-18634, a heap buffer overflow that leads to privilege escalation on sudo &lt;=1830 if

exploit

CVE-2019-18634 working python exploit on Ubuntu 2004, sudo version 1825 replace "/shellsh" with your reverse shell writeup at y3agithubio/2021/03/03/sudo-cve-analysis/

Hacking links

Privilege Escalation Scripts githubcom/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS - (linpeassh) githubcom/mzet-/linux-exploit-suggester - (linux exploit suggester) githubcom/saghul/lxd-alpine-buildergit - (LXD Alpine Linux image builder) githubcom/pentestmonkey/windows-privesc-check - (windows-privesc-c

My n-day exploit for CVE-2019-18634 (local privilege escalation)

CVE-2019-18634 N-Day Exploit Slides docsgooglecom/presentation/d/11DpUy9Ll_HeuPRSgzaTARHPwlq01v_yyqbnJURlG9Ss/edit?usp=sharing Requirements Ubuntu 2004 sudo 1825 (see below for how to build it manually) Python3 pwntools Enable pwfeedback sudo visudo Change this line Defaults env_reset

Simple and accurate guide for linux privilege escalation tactics

Linux-Privilege-Escalation-Basics Simple and accurate guide for linux privilege escalation tactics Privilege Escalation Methods Basic System Enumeration Bash History OpenVPN Credentials Credentials in tcpdump files Writable Files SSH Private Keys Kernel Expliots Sudo -l Sudo CVE Sudo LD_PRELOAD SUID / GUID Binaries SUID PATH Environmental Variable Cron Tabs &amp; Scheduled

Config files for my GitHub profile.

Linux-Privilege-Escalation-Basics Simple and accurate guide for linux privilege escalation tactics Privilege Escalation Methods Basic System Enumeration Bash History OpenVPN Credentials Credentials in tcpdump files Writable Files SSH Private Keys Kernel Expliots Sudo -l Sudo CVE Sudo LD_PRELOAD SUID / GUID Binaries SUID PATH Environmental Variable Cron Tabs &amp; Scheduled

Reverse shell cheat sheet

Privilege Escalation Methods Basic System Enumeration Bash History OpenVPN Credentials Credentials in tcpdump files Writable Files SSH Private Keys Kernel Expliots Sudo -l Sudo CVE Sudo LD_PRELOAD SUID / GUID Binaries SUID PATH Environmental Variable Cron Tabs &amp; Scheduled Tasks Capabilities (Python - Perl - Tar - OpenSSL) NFS Root Squashing chkrootkit 049 Tmux (Attach

Linux-Privilege-Escalation-Basics Simple and accurate guide for linux privilege escalation tactics Privilege Escalation Methods Basic System Enumeration Bash History OpenVPN Credentials Credentials in tcpdump files Writable Files SSH Private Keys Kernel Expliots Sudo -l Sudo CVE Sudo LD_PRELOAD SUID / GUID Binaries SUID PATH Environmental Variable Cron Tabs &amp; Scheduled

Compilation of Resources for Linux Privilege Escalation

Linux-Privilege-Escalation-Resources Compilation of Resources for Linux Privilege Escalation General Links Github: githubcom/0dayhunter LinPEAS: githubcom/0dayhunter/PEASS-ng LinuxPrivEscArena: tryhackmecom/room/linuxprivescarena Linux exploit suggester: githubcom/0dayhunter/Linux-exploit-suggester Introduction Basic Linux Priv Esc: b

A reproduction of CVE-2019-18634, sudo privilege escalation with buffer overflow.

CVE-2019-18634 This is a basic reproduction of CVE-2019-18634, a privilege escalation exploit in sudo with pwfeedback enabled This was created as part of a project for NTU SC3010 to demonstrate a security vulnerability To reproduce the exploit, a Docker image of Ubuntu 2004 was used A vulnerable sudo version is then installed and configured to enable the vulnerable exploit

Personal "King of The Hill" toolkit.

KoTH-Tools Welcome to KoTH-Tools, a collection of custom tools used in TryHackMe's King of the Hill competition These tools are designed for use on Linux machines Table of Contents CVEs Directory Static Directory Monitor Directory Animations Directory Scripts Reverse Shells CVEs Directory This directory contains exploits for CVEs found in the machines CVE-2019-18634-

Inspec checks for various tasks

Inspec checks Inspec checks for various tasks Running a check locally cd custom-inspec sudo inspec exec sudo-no-pwfeedback Running a check remotely cd custom-inspec inspec exec sudo-no-pwfeedback --target=ssh://&lt;remote host name or IP&gt; --user=&lt;remote user&gt; --sudo Inspec onl

Pentesting Linux

Pentesting Linux Initial Foothold Questions to consider What distribution of Linux is the system running? What shell &amp; programming languages exist on the system? What function is the system serving for the network environment it is on? What application is the system hosting? Are there any known vulnerabilities? Useful commands and tools on Linux Useful shortcuts and h

PoC exploits for software vulnerabilities

CVE Exploit PoC's PoC exploits for multiple software vulnerabilities Current exploits CVE-2019-18634 (LPE): Stack-based buffer overflow in sudo tgetpassc when pwfeedback module is enabled CVE-2021-3156 (LPE): Heap-based buffer overflow in sudo sudoersc when an argv ends with backslash character CVE-2020-28018 (RCE): Exim Use-After-Free (UAF) in tls-opensslc leading t

Recent Articles

Facebook loses control of its own Twitter account in hacker attack – and more news
The Register • Shaun Nichols in San Francisco • 10 Feb 2020

Including: Why was #RootGoat2020 trending on Twitter? It is as silly as you think

Roundup It's time yet again to recap the latest security happenings. An otherwise slow Friday afternoon has been spiced up by a hacker crew that managed to temporarily take control of Facebook's official Twitter account. OurMine did not say how it got into the Social Network's Twitter account, but it did take the opportunity to blast Zuck and Co.'s security practices: Towards the end of last week, you may have noticed an odd trend amongst infosec people on Twitter, as the hashtag "#RootGoat2020"...

References

CWE-787https://support.apple.com/kb/HT210919https://www.sudo.ws/security.htmlhttps://seclists.org/bugtraq/2020/Jan/44https://www.sudo.ws/alerts/pwfeedback.htmlhttp://www.openwall.com/lists/oss-security/2020/01/30/6http://www.openwall.com/lists/oss-security/2020/01/31/1http://seclists.org/fulldisclosure/2020/Jan/40https://www.debian.org/security/2020/dsa-4614https://lists.debian.org/debian-lts-announce/2020/02/msg00002.htmlhttps://seclists.org/bugtraq/2020/Feb/3https://seclists.org/bugtraq/2020/Feb/2http://packetstormsecurity.com/files/156174/Slackware-Security-Advisory-sudo-Updates.htmlhttp://packetstormsecurity.com/files/156189/Sudo-1.8.25p-Buffer-Overflow.htmlhttp://www.openwall.com/lists/oss-security/2020/02/05/2http://www.openwall.com/lists/oss-security/2020/02/05/5https://usn.ubuntu.com/4263-1/https://security.netapp.com/advisory/ntap-20200210-0001/https://usn.ubuntu.com/4263-2/https://access.redhat.com/errata/RHSA-2020:0487https://access.redhat.com/errata/RHSA-2020:0509https://access.redhat.com/errata/RHSA-2020:0540http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00029.htmlhttps://access.redhat.com/errata/RHSA-2020:0726https://security.gentoo.org/glsa/202003-12https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IY6DZ7WMDKU4ZDML6MJLDAPG42B5WVUC/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6TKF36KOQUVJNBHSVJFA7BU3CCEYD2F/https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950371https://nvd.nist.govhttps://usn.ubuntu.com/4263-1/https://www.debian.org/security/2020/dsa-4614