The Linux Sudo bug called “Baron Samedit”, which has been going on for 10 years, affects most distributions.
A major vulnerability affecting the Linux ecosystem has emerged in Sudo, which allows administrators to grant limited root access to other users. With this vulnerability in the Linux Sudo program, users can access all of the administrator permissions in the operating system, and it threatens privacy.
Sudo, as it is known, is a program that enables ordinary users in Linux to perform operations that require administrator authority without having to log into the system as an administrator. In this way, you can define the required authorities to the desired user without taking the user accounts on Linux to the administrator level or sharing the password of the administrator account.
A new vulnerability was found for the Sudo program, which has a very large place in Linux distributions. Successful exploitation of the Baron Samedit vulnerability, as named by Qualys, the security audit firm that discovered the CVE-2021-3156 vulnerability or bug that has been in Sudo for exactly 10 years, allows any user without privileged authority to gain administrator permissions on the vulnerable host. .
Security researchers at Qualys company have confirmed this error they found. Then, among Linux distributions, they were able to develop multiple exploit types and obtain full root privileges by taking advantage of this vulnerability in Ubuntu 20.04 (Sudo 1.8.31), Debian 10 (Sudo 1.8.27) and Fedora 33 (Sudo 1.9.2). Other distributions are likely to exploit Baron Samedit to exploit security.
Qualys also published a video containing technical explanations on the subject.
Finally, let’s note that after the necessary feedback, the developers of the Sudo program completely fixed the problem with the Sudo v1.9.5p2 version earlier today.