ADVISORY!

TLP : CLEAR

Date : 05/07/2024

REF NO : CERT / 2024/07/59

OpenSSH Remote Code Execution Vulnerability

Severity Level: High

Components Affected

  • OpenSSH versions between 8.5p1 and 9.7p1 (inclusive)

Overview

A vulnerability was identified in OpenSSH. A remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system.

Note:

CVE-2024-6387 affected sshd(8) was present in Portable OpenSSH versions between 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code execution with root privileges.

Description

A security regression (CVE-2006-5051) was discovered in OpenSSH’s server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

Impact

  • Remote Code Execution

Solution/ Workarounds

Before installation of the software, please visit the software manufacturer web-site for more details.

The vendors have issued fixes:

https://www.openssh.com/txt/release-9.8

[Updated on 2024-07-05]

For Cisco Products

For detail, please refer to the links below:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssh-rce-2024

Reference

Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.

Sri Lanka Computer Emergency Readiness Team | Coordination Centre

Copyright © 2023 SRI LANKA CERT | CC