/
Handle the CVE-2021-3156 Vulnerability

Handle the CVE-2021-3156 Vulnerability

A severe vulnerability has been found in Unix and Linux operating systems, that can affect Smart ID Digital Access componentThis article describes how to handle the vulnerability.

This is only a problem if you have added unprivileged users to the system. The default installation does not have any unprivileged users.

An unprivileged user can exploit the vulnerability using sudo, which can cause a heap overflow to elevate privileges to root, without authentication, or even get listed in the sudoers file. 

  1. Run this command to see if you have a vulnerable system:

    Check if you have a vulnerable system

    sudoedit -s /

     

    1. If you have a vulnerable system, the response is 

      sudoedit: /: not a regular file



  2. Depending on version, enter these commands to handle the vulnerability:

    1. For Digital Access 6.0.0 to 6.0.2

      For Digital Access 6.0.0 to 6.0.2

      sudo apt update sudo apt install sudo=1.8.31-1ubuntu1.2



    2. For Digital Access 5.13.1 - 5.13.5

      For Digital Access 5.13.1 to 5.13.5



  3. Run this command again:

    Check the system again for vulnerability



    1. The answer shall now be:

      Answer if system is not vulnerable



Related content

Smart ID Digital Access component
Smart ID Digital Access component
More like this
Handle the CVE-2021-3449 Vulnerability
Handle the CVE-2021-3449 Vulnerability
More like this
Release note Smart ID 20.11.6
Release note Smart ID 20.11.6
More like this
Resolve a vulnerability in Digital Access that can result in a Denial of service
Resolve a vulnerability in Digital Access that can result in a Denial of service
More like this
Resolve a phishing vulnerability in Hybrid Access Gateway and Digital Access
Resolve a phishing vulnerability in Hybrid Access Gateway and Digital Access
More like this
Release note Smart ID 20.11.3
Release note Smart ID 20.11.3
More like this

Copyright 2024 Technology Nexus Secured Business Solutions AB. All rights reserved.
Contact Nexus | https://www.nexusgroup.com | Disclaimer | Terms & Conditions