How to Exploit and Patch Ubuntu’s Silent Sudo User Vulnerability

This article explains a critical Ubuntu flaw that lets a standard user create a new sudo account and gain root privileges without a system password, details the step‑by‑step exploitation process, and outlines the official patches released to fix the issue.

21CTO
21CTO
21CTO
How to Exploit and Patch Ubuntu’s Silent Sudo User Vulnerability

Attack Method

Open a terminal in your home directory and create a symbolic link named .pam_environment that points to /dev/zero: ln -s /dev/zero .pam_environment If the command fails, a .pam_environment file already exists; rename it as a backup before proceeding.

Next, open Settings → Region & Language and attempt to change the language. The dialog will freeze; simply ignore it and return to the terminal.

At this point the accounts-daemon process consumes 100 % CPU, slowing and heating the machine.

Delete the symbolic link to restore normal operation: rm .pam_environment Find the PID of accounts-daemon (it appears at the top of top because it is stuck in an infinite loop) or use pidof: pidof accounts-daemon Send a SIGSTOP signal to pause the daemon: kill -SIGSTOP 597 Set a timer that, after logging out, sends SIGSEGV and then SIGCONT to the daemon to force it to crash and reset:

nohup bash -c "sleep 30s; kill -SIGSEGV 597; kill -SIGCONT 597"

After logging out and waiting a few seconds, the exploit triggers a series of dialogs that allow you to create a new user account with administrator privileges, enabling sudo commands.

Attack Principle

The vulnerability exploits two bugs in Ubuntu:

The accountservice daemon (accounts‑daemon) reads a file named .pam_environment from the user’s home directory via a function is_in_pam_environment. By linking this file to /dev/zero, the daemon reads an infinitely long stream, causing it to hang and lose its root privileges.

The GNOME Display Manager ( gdm3 ) relies on accounts‑daemon to determine the number of existing users during the initial system setup. When accounts‑daemon is stuck, gdm3 times out, assumes zero users, and launches gnome-initial-setup, which requires an administrator account.

By crashing accounts‑daemon and forcing gdm3 to think no users exist, the attacker can create a new admin account without a password.

Official Fix

Security researcher Kevin Backhouse reported the bugs on October 17. Ubuntu and GNOME have released patches in the latest code; users should update their systems immediately.

The vulnerability only affects desktop editions of Ubuntu. Systems using only a command‑line interface or non‑GNOME desktop environments are not impacted.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

CVEprivilege escalationExploitLinux securityUbuntuRoot Access
21CTO
Written by

21CTO

21CTO (21CTO.com) offers developers community, training, and services, making it your go‑to learning and service platform.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.