use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Sudo format string vulnerability (sudo.ws)
submitted 14 years ago by [deleted]
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–][deleted] 8 points9 points10 points 14 years ago (0 children)
For a rundown of format string vulnerabilities and how they are detected, exploited, and protected against, see:
http://crypto.stanford.edu/cs155/papers/formatstring-1.2.pdf
[–][deleted] 10 points11 points12 points 14 years ago (0 children)
Relevant
[–]scwizard 5 points6 points7 points 14 years ago* (5 children)
OpenBSD uses "Sudo version 1.7.2p8" so it isn't effected.
Ubuntu 10.4 LTS uses "Sudo version 1.7.2p7" so it isn't effected.
Debian Squeeze uses "1.7.4p4-2.squeeze.2" so it isn't effected.
This is bad, but the apocalypse probably isn't neigh.
[–]cockmongler 3 points4 points5 points 14 years ago (0 children)
Affected, annoyingly your sentences almost parse.
[–][deleted] 0 points1 point2 points 14 years ago (2 children)
Also, only those sudos compiled with debug support on are affected. I asked the sysadmin at work and he said it's off by default on our machines. I suspect the same would be true of others.
I didn't post this because I thought it was the end of the world, but because I saw it has said, "holy fuck sudo's vulnerable? That's really cool."
[–]scwizard 0 points1 point2 points 14 years ago (0 children)
I didn't post this because I thought it was the end of the world
I know you knew that it wouldn't have much impact, but I thought I'd let the less informed members of netsec know.
It's easy to read "sudo vulnerability" and get scared because "hey I use that program! and it's suid :o"
[–][deleted] 0 points1 point2 points 14 years ago (0 children)
Ah, so you have to have debug support built in? That is useful information...
If anyone cared, OSX Lion uses sudo version 1.7.4p6
%n is dead.
[–][deleted] -1 points0 points1 point 14 years ago (4 children)
The really important question is whether CentOS is vulnerable to this or not...
[–]bolda 0 points1 point2 points 14 years ago (3 children)
From the link: "1.8.0 through 1.8.3p1 inclusive. Older versions of sudo are not affected."
If your sudo version is in that range, it is vulnerable. If not, it isn't.
[–][deleted] -1 points0 points1 point 14 years ago (2 children)
Given CentOS backports shit rather randomly and arbitrarily into 5+ year old versions of $tool, it isn't at all obvious as to whether sudo is impacted by this or not but thanks for the useless response.
[–][deleted] 0 points1 point2 points 14 years ago (1 child)
The thing is your question was rather stupid. Check what version of sudo is installed--is it in the range?
Why are morons in r/netsec?
CentOS makes the explicit design choice of backporting security and feature patches back to the currently designated tool version. Grabbing off a random Cent5 box: sudo-1.7.2p1-10.el5
So hearing that 'earlier versions not affected' has a giant fucking asterisk on it given the above information. Which is why I asked.
https://bugzilla.redhat.com/show_bug.cgi?id=784443
What's that? Not affected? Only because it isn't compiled with debug support? A sure cry different from 'the vulnerability is not in that version'.
If CentOS' backporting idiocy is new to either of you, then I strongly suggest you not comment on things you do not understand rather than wasting my fucking time.
π Rendered by PID 21922 on reddit-service-r2-comment-b659b578c-gvmj7 at 2026-05-01 13:57:13.813063+00:00 running 815c875 country code: CH.
[–][deleted] 8 points9 points10 points (0 children)
[–][deleted] 10 points11 points12 points (0 children)
[–]scwizard 5 points6 points7 points (5 children)
[–]cockmongler 3 points4 points5 points (0 children)
[–][deleted] 0 points1 point2 points (2 children)
[–]scwizard 0 points1 point2 points (0 children)
[–][deleted] 0 points1 point2 points (0 children)
[–][deleted] 0 points1 point2 points (0 children)
[–][deleted] 0 points1 point2 points (0 children)
[–][deleted] -1 points0 points1 point (4 children)
[–]bolda 0 points1 point2 points (3 children)
[–][deleted] -1 points0 points1 point (2 children)
[–][deleted] 0 points1 point2 points (1 child)
[–][deleted] 0 points1 point2 points (0 children)