HomeSudo ProjectCVE-2021-3156

CVE-2021-3156

HIGH
7.8CVSS
Published: 2021-01-26
Updated: 2025-11-10
AI Analysis

Description

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
local
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-193CWE-193

Metadata

Primary Vendor
SUDO_PROJECT
Published
1/26/2021
Last Modified
11/10/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

sudo_project : sudosudo_project : sudosudo_project : sudosudo_project : sudofedoraproject : fedorafedoraproject : fedoradebian : debian_linuxdebian : debian_linuxnetapp : active_iq_unified_managernetapp : cloud_backupnetapp : hci_management_nodenetapp : oncommand_unified_manager_core_packagenetapp : ontap_select_deploy_administration_utilitynetapp : ontap_toolsnetapp : solidfiremcafee : web_gatewaymcafee : web_gatewaymcafee : web_gatewaysynology : diskstation_manager_unified_controllersynology : diskstation_managersynology : skynas_firmwaresynology : vs960hd_firmwarebeyondtrust : privilege_management_for_macbeyondtrust : privilege_management_for_unix\/linuxoracle : micros_compact_workstation_3_firmwareoracle : micros_es400_firmwareoracle : micros_kitchen_display_system_firmwareoracle : micros_workstation_5a_firmwareoracle : micros_workstation_6_firmwareoracle : communications_performance_intelligence_centeroracle : communications_performance_intelligence_centeroracle : tekelec_platform_distribution

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-3156 | HIGH Severity | CVEDatabase.com | CVEDatabase.com