SB2021030303 - Multiple vulnerabilities in VMware Tanzu Products



SB2021030303 - Multiple vulnerabilities in VMware Tanzu Products

Published: March 3, 2021 Updated: May 14, 2023

Security Bulletin ID SB2021030303
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Heap-based buffer overflow (CVE-ID: CVE-2021-3156)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in sudo. A local user can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system with root privileges.



2) Link following (CVE-ID: CVE-2021-23239)

The vulnerability allows a local authenticated user to gain access to sensitive information.

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.


Remediation

Install update from vendor's website.