Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-18634 PoC — Sudo 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Sudo 缓冲区错误漏洞 (CVE-2019-18634)
Description:In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
Readme
# CVE-2019-18634

https://www.sudo.ws/alerts/pwfeedback.html

https://nvd.nist.gov/vuln/detail/CVE-2019-18634

Credit to Joe Vennix from Apple Information Security for finding the bug.
File Snapshot

[4.0K] /data/pocs/2df99a5bd48866360f7812c022d6dc10bf6c5b02 ├── [6.2K] exploit.c ├── [1.0K] LICENSE ├── [ 230] Makefile └── [ 185] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →