Sudo Heap-Based Buffer Overflow Attempt
Identifies the attempted use of a heap-based buffer overflow vulnerability for the Sudo binary in Unix-like systems (CVE-2021-3156). Successful exploitation allows an unprivileged user to escalate to the root user.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2021/02/03"
3integration = ["endpoint"]
4maturity = "production"
5updated_date = "2025/01/15"
6
7[rule]
8author = ["Elastic"]
9description = """
10Identifies the attempted use of a heap-based buffer overflow vulnerability for the Sudo binary in Unix-like systems
11(CVE-2021-3156). Successful exploitation allows an unprivileged user to escalate to the root user.
12"""
13false_positives = [
14 """
15 This rule could generate false positives if the process arguments leveraged by the exploit are shared by custom
16 scripts using the Sudo or Sudoedit binaries. Only Sudo versions 1.8.2 through 1.8.31p2 and 1.9.0 through 1.9.5p1 are
17 affected; if those versions are not present on the endpoint, this could be a false positive.
18 """,
19]
20from = "now-9m"
21index = ["auditbeat-*", "logs-endpoint.events.*"]
22language = "kuery"
23license = "Elastic License v2"
24name = "Sudo Heap-Based Buffer Overflow Attempt"
25references = [
26 "https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3156",
27 "https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit",
28 "https://www.bleepingcomputer.com/news/security/latest-macos-big-sur-also-has-sudo-root-privilege-escalation-flaw",
29 "https://www.sudo.ws/alerts/unescape_overflow.html",
30]
31risk_score = 73
32rule_id = "f37f3054-d40b-49ac-aa9b-a786c74c58b8"
33severity = "high"
34tags = [
35 "Domain: Endpoint",
36 "OS: Linux",
37 "OS: macOS",
38 "Use Case: Threat Detection",
39 "Tactic: Privilege Escalation",
40 "Use Case: Vulnerability",
41 "Data Source: Elastic Defend",
42 "Resources: Investigation Guide",
43]
44timestamp_override = "event.ingested"
45type = "threshold"
46
47query = '''
48event.category:process and event.type:start and
49 process.name:(sudo or sudoedit) and
50 process.args:(*\\ and ("-i" or "-s"))
51'''
52note = """## Triage and analysis
53
54> **Disclaimer**:
55> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
56
57### Investigating Sudo Heap-Based Buffer Overflow Attempt
58
59Sudo is a critical utility in Unix-like systems, allowing users to execute commands with elevated privileges. A heap-based buffer overflow in Sudo (CVE-2021-3156) can be exploited by attackers to gain root access. Adversaries may craft specific command-line arguments to trigger this vulnerability. The detection rule identifies suspicious Sudo or Sudoedit invocations with particular argument patterns, signaling potential exploitation attempts.
60
61### Possible investigation steps
62
63- Review the alert details to confirm the presence of suspicious Sudo or Sudoedit invocations with the specific argument patterns: process.args containing a backslash followed by either "-i" or "-s".
64- Examine the process execution context by gathering additional details such as the user account associated with the process, the parent process, and the command line used.
65- Check the system logs for any other unusual or unauthorized activities around the time of the alert to identify potential lateral movement or further exploitation attempts.
66- Investigate the history of the user account involved to determine if there have been any previous suspicious activities or privilege escalation attempts.
67- Assess the system for any signs of compromise or unauthorized changes, such as new user accounts, modified files, or unexpected network connections.
68- Verify the current version of Sudo installed on the system to determine if it is vulnerable to CVE-2021-3156 and consider applying patches or updates if necessary.
69
70### False positive analysis
71
72- Routine administrative tasks using sudo or sudoedit with interactive or shell options may trigger the rule. Review the context of these commands and consider excluding specific user accounts or scripts that are known to perform legitimate administrative functions.
73- Automated scripts or cron jobs that use sudo with the -i or -s options for legitimate purposes can be flagged. Identify these scripts and add them to an exception list to prevent unnecessary alerts.
74- Development or testing environments where users frequently test commands with elevated privileges might generate false positives. Implement a separate monitoring policy for these environments or exclude known test accounts.
75- Security tools or monitoring solutions that simulate attacks for testing purposes may inadvertently trigger the rule. Ensure these tools are recognized and excluded from triggering alerts by adding them to an exception list.
76- Users with legitimate reasons to frequently switch to root using sudo -i or sudo -s should be identified, and their activities should be monitored separately to avoid false positives.
77
78### Response and remediation
79
80- Immediately isolate the affected system from the network to prevent further exploitation or lateral movement by the attacker.
81- Terminate any suspicious sudo or sudoedit processes identified by the detection rule to halt ongoing exploitation attempts.
82- Apply the latest security patches and updates to the Sudo utility on all affected systems to remediate the vulnerability (CVE-2021-3156).
83- Conduct a thorough review of system logs and process execution history to identify any unauthorized access or privilege escalation activities.
84- Reset passwords for all user accounts on the affected system, especially those with elevated privileges, to mitigate potential credential compromise.
85- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to assess the scope of the breach.
86- Implement enhanced monitoring and alerting for sudo and sudoedit command executions across the network to detect similar exploitation attempts in the future."""
87
88
89[[rule.threat]]
90framework = "MITRE ATT&CK"
91[[rule.threat.technique]]
92id = "T1068"
93name = "Exploitation for Privilege Escalation"
94reference = "https://attack.mitre.org/techniques/T1068/"
95
96
97[rule.threat.tactic]
98id = "TA0004"
99name = "Privilege Escalation"
100reference = "https://attack.mitre.org/tactics/TA0004/"
101
102[rule.threshold]
103field = ["host.hostname"]
104value = 100
Triage and analysis
Disclaimer: This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
Investigating Sudo Heap-Based Buffer Overflow Attempt
Sudo is a critical utility in Unix-like systems, allowing users to execute commands with elevated privileges. A heap-based buffer overflow in Sudo (CVE-2021-3156) can be exploited by attackers to gain root access. Adversaries may craft specific command-line arguments to trigger this vulnerability. The detection rule identifies suspicious Sudo or Sudoedit invocations with particular argument patterns, signaling potential exploitation attempts.
Possible investigation steps
- Review the alert details to confirm the presence of suspicious Sudo or Sudoedit invocations with the specific argument patterns: process.args containing a backslash followed by either "-i" or "-s".
- Examine the process execution context by gathering additional details such as the user account associated with the process, the parent process, and the command line used.
- Check the system logs for any other unusual or unauthorized activities around the time of the alert to identify potential lateral movement or further exploitation attempts.
- Investigate the history of the user account involved to determine if there have been any previous suspicious activities or privilege escalation attempts.
- Assess the system for any signs of compromise or unauthorized changes, such as new user accounts, modified files, or unexpected network connections.
- Verify the current version of Sudo installed on the system to determine if it is vulnerable to CVE-2021-3156 and consider applying patches or updates if necessary.
False positive analysis
- Routine administrative tasks using sudo or sudoedit with interactive or shell options may trigger the rule. Review the context of these commands and consider excluding specific user accounts or scripts that are known to perform legitimate administrative functions.
- Automated scripts or cron jobs that use sudo with the -i or -s options for legitimate purposes can be flagged. Identify these scripts and add them to an exception list to prevent unnecessary alerts.
- Development or testing environments where users frequently test commands with elevated privileges might generate false positives. Implement a separate monitoring policy for these environments or exclude known test accounts.
- Security tools or monitoring solutions that simulate attacks for testing purposes may inadvertently trigger the rule. Ensure these tools are recognized and excluded from triggering alerts by adding them to an exception list.
- Users with legitimate reasons to frequently switch to root using sudo -i or sudo -s should be identified, and their activities should be monitored separately to avoid false positives.
Response and remediation
- Immediately isolate the affected system from the network to prevent further exploitation or lateral movement by the attacker.
- Terminate any suspicious sudo or sudoedit processes identified by the detection rule to halt ongoing exploitation attempts.
- Apply the latest security patches and updates to the Sudo utility on all affected systems to remediate the vulnerability (CVE-2021-3156).
- Conduct a thorough review of system logs and process execution history to identify any unauthorized access or privilege escalation activities.
- Reset passwords for all user accounts on the affected system, especially those with elevated privileges, to mitigate potential credential compromise.
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to assess the scope of the breach.
- Implement enhanced monitoring and alerting for sudo and sudoedit command executions across the network to detect similar exploitation attempts in the future.
References
Related rules
- Potential JAVA/JNDI Exploitation Attempt
- Potential Privilege Escalation via CVE-2023-4911
- Potential Privilege Escalation via Enlightenment
- Potential Privilege Escalation via OverlayFS
- Potential Privilege Escalation via PKEXEC