Decade-old vulnerability is still affecting most Linux distros

security threat
(Image credit: Shutterstock.com)

Security researchers at Qualys discovered a privilege escalation vulnerability in one of the core utilities present in all Unix-like operating systems including Linux

If exploited, the heap overflow vulnerability in the Sudo utility could allow any unprivileged user to gain root privileges.

The vulnerability, which has now been patched, has existed for almost a decade, according to a blog post by Animesh Jain, a Vulnerability Signatures Product Manager at Qualys.

Easily exploitable

The Sudo utility allows system admins to delegate limited root privileges to normal users. It’s governed by the sudoers configuration file, which lists the users who can run with elevated privileges. According to Qualys, the vulnerability allowed even normal users not listed in the sudoers files to gain super user privileges.

The vulnerability, which is being tracked as CVE-2021-3156, has been patched earlier today with the release of Sudo v1.9.5p2.

According to reports, there have been two other security flaws in the sudo utility that were disclosed over the past two years. The latest one however is considered to be the most damaging of the lot, since it wasn’t too difficult to exploit.

In fact, Qualys created three exploits based on this vulnerability and managed to obtain full root privileges on Ubuntu 20.04 (which uses Sudo 1.8.31), Debian 10 (with Sudo 1.8.27), and Fedora 33 (with Sudo 1.9.2). 

Since Sudo is used by virtually all Unix-like operating systems including the various BSDs, Jain says that other operating systems and distributions are also likely to be exploitable.

Via: ZDNet

TOPICS
Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Latest in Pro
Woman shocked by online scam, holding her credit card outside
Cybercriminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets
Customer service 3D manager concept. AI assistance headphone call center
The era of Agentic AI
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
A hand reaching out to touch a futuristic rendering of an AI processor.
Balancing innovation and security in an era of intensifying global competition
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
Latest in News
Apple iPhone 16 Pro Max REVIEW
New iPhone 17 Air leak may have revealed some key specs – and how it compares to the iPhone 17 Pro Max
Apple iPhone 16 Review
Three iPhone 17 model dummy units appear in a hands-on video leak
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
New Samsung Galaxy S25 Edge may have revealed some key details – including its price
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 10 (game #1141)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 10 (game #372)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 10 (game #638)