Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-18634 PoC — Sudo 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Sudo 缓冲区错误漏洞 (CVE-2019-18634)
Description:In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
Description
exploit for sudo CVE-2019-18634
Readme
# CVE-2019-18634

I wrote this exploit for Linx Mint 19.1 so probably it'll not work for other distributions. If you're exploint a real environment I recommend you to use Salem Rashid's exploit version, which has the proper offsets for other sudo versions.

This is just an exploit for this specfic OS, so perhaps not a full reliable exploit for other distros.

Please check this for more info on the vulnerability: https://www.sudo.ws/alerts/pwfeedback.html

File Snapshot

[4.0K] /data/pocs/5412a7a6e2ecf9285137663708d937d1964f4846 ├── [4.3K] exploit.c └── [ 460] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →