@online{qualys, author = "Animesh Jain, Qualys", title = "CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit)", url = "https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit" } @online{qualys_ad, author = "Qualys", title = "Qualys Security Advisory Baron Samedit: Heap-based buffer overflow in Sudo (CVE-2021-3156)", url = "https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt" } @online{lovf, author = "LiveOverflow", title = "Sudo Vulnerability Walkthrough", url = "https://www.youtube.com/watch?v=TLa2VqcGGEQ&list=PLhixgUqwRTjy0gMuT4C3bmjeZjuNQyqdx" } @online{syst3, author = "0xdevil https://github.com/0xdevil", title = "[CVE-2021-3156] Exploiting Sudo heap overflow on Debian 10", url = "https://syst3mfailure.io/sudo-heap-overflow" } @online{git_sudo, author = "sudo-project", title = "Sudo 1.8.27", url = "https://github.com/sudo-project/sudo/tree/33fc64d9e081875f3a8f03f83610129ff7003d17" } @online{glibc, author = "Bootlin", title = "Source glibc-2.28", url = "https://elixir.bootlin.com/glibc/glibc-2.28/source" }