TLP : CLEAR
Date : 05/07/2024
REF NO : CERT / 2024/07/59
Severity Level: High
Components Affected
Overview
A vulnerability was identified in OpenSSH. A remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system.
Note:
CVE-2024-6387 affected sshd(8) was present in Portable OpenSSH versions between 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code execution with root privileges.
Description
A security regression (CVE-2006-5051) was discovered in OpenSSH’s server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
Impact
Solution/ Workarounds
Before installation of the software, please visit the software manufacturer web-site for more details.
The vendors have issued fixes:
https://www.openssh.com/txt/release-9.8
[Updated on 2024-07-05]
For Cisco Products
For detail, please refer to the links below:
Reference
Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.
Sri Lanka Computer Emergency Readiness Team | Coordination Centre