sudo Heap Buffer Overflow Vulnerability
漏洞信息
漏洞名称: sudo Heap Buffer Overflow Vulnerability
漏洞编号:
- CVE: CVE-2021-3156
漏洞类型: 缓冲区溢出
漏洞等级: 高危
漏洞描述: 受影响的产品是sudo,一个在Unix和Linux操作系统中广泛使用的程序,允许用户以其他用户(通常是超级用户)的权限运行程序。它通常部署在企业级服务器和个人计算机上,是系统管理的关键组件。该漏洞的类型是堆缓冲区溢出,技术根源在于sudo在处理命令行参数时未能正确验证输入长度,导致攻击者可以覆盖堆内存中的关键数据。这种漏洞的影响分析表明,攻击者可以利用此漏洞以低权限本地用户的身份执行任意代码,进而获得root权限,导致系统完全被控制。此漏洞不需要用户交互即可被利用,且可以自动化攻击,因此构成了严重的安全风险。
产品名称: sudo
影响版本: v1.8.2+
来源: https://github.com/zharkaron/cve-2025-zharkaron
类型: CVE-2025:github search
仓库文件
- CVE-2021-3156
- Readme.md
来源概述
🛡️ CVE LAB by Zharkaron
A curated and hands-on CVE exploitation and defense lab. This repository contains real and simulated vulnerabilities reproduced in Docker environments for learning and research purposes.
Each CVE entry includes:
- 🔓 A vulnerable Docker container for exploitation
- 🔐 A hardened Docker container for defense
- 🚀 Exploits and proof-of-concepts
- 📚 Writeups and mitigation strategies
📂 CVE Index
CVE ID | Vulnerability Type | Service / App | Status |
---|---|---|---|
CVE-2021-3156 | Heap Buffer Overflow (PE) | sudo v1.8.2+ | ✅ Complete |
✅ = Fully documented
🛠️ = Lab + Exploit present, README in progress
⏳ = Coming soon
📦 CVES Template of how things are going to look like
1 |
|
sudo Heap Buffer Overflow Vulnerability
http://example.com/2025/07/30/github_3486811502/