Plazmaz / CVE-2019-18634

A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc

Home Page:https://dylankatz.com/Analysis-of-CVE-2019-18634/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2019-18634

⚠️ This code has only been tested on sudo 1.8.25. The bug impacts <1.8.30, but there are differences in character handling that prevent this PoC from executing (this does not mitigate the exploitability of the bug). See #1 ⚠️

Functional exploit for CVE-2019-18634, a heap buffer overflow that leads to privilege escalation on sudo <=1.8.30 if pwfeedback is enabled.
https://dylankatz.com/Analysis-of-CVE-2019-18634/
This repo contains both a single-file script (self-contained.sh), and the scripts used to generate it (under src)
Thanks to yuu and Anonymous_ for help in developing this exploit and these scripts.
Credit to Joe Vennix and William Bowling for the original discovery of the bug and the information on exploiting through 1.8.30.

About

A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc

https://dylankatz.com/Analysis-of-CVE-2019-18634/


Languages

Language:Shell 62.4%Language:C 20.9%Language:Perl 16.6%