{"id":165087,"date":"2024-07-01T14:01:36","date_gmt":"2024-07-01T14:01:36","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=165087"},"modified":"2024-07-01T14:02:51","modified_gmt":"2024-07-01T14:02:51","slug":"openssh-server-critical-flaw","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/165087\/security\/openssh-server-critical-flaw.html","title":{"rendered":"Critical unauthenticated remote code execution flaw in OpenSSH server"},"content":{"rendered":"
<\/div>\n

A critical flaw in the OpenSSH server can be exploited to achieve unauthenticated remote code execution with root privileges in glibc-based Linux systems.<\/h2>\n\n\n\n

OpenSSH maintainers addressed a critical vulnerability, tracked as CVE-2024-6387, that can lead to unauthenticated remote code execution with root privileges in glibc-based Linux systems. <\/p>\n\n\n\n

OpenSSH maintained have addressed the vulnerability with the release of version 9.8 on July 01, 2024.<\/p>\n\n\n\n

“A critical vulnerability in sshd(8) was present in Portable OpenSSH versions between 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code execution with root privileges. Successful exploitation has been demonstrated on 32-bit Linux\/glibc systems with ASLR. Under lab conditions, the attack requires on average 6-8 hours of continuous connections up to the maximum the server will accept. Exploitation on 64-bit systems is believed to be possible but has not been demonstrated at this time. It’s likely that these attacks will be improved upon.” reads the advisory<\/a>. “Exploitation on non-glibc systems is conceivable but has not been examined. Systems that lack ASLR or users of downstream Linux distributions that have modified OpenSSH to disable per-connection ASLR re-randomisation (yes – this is a thing, no – we don’t understand why) may potentially have an easier path to exploitation.”<\/em><\/gwmw><\/gwmw><\/p>\n\n\n\n

The\u00a0Qualys Threat Research Unit (TRU)<\/a>\u00a0has discovered the Remote\u00a0Unauthenticated\u00a0<\/strong>Code Execution (RCE) vulnerability in OpenSSH\u2019s server (sshd) in glibc-based Linux systems.<\/p>\n\n\n\n

The issue is due to a signal handler race condition, Qualys researchers state that the flaw poses a considerable risk because it affects sshd in its default configuration.<\/p>\n\n\n\n

“The vulnerability, which is a signal handler race condition in OpenSSH\u2019s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems; that presents a significant security risk. This race condition affects sshd in its default configuration.” reported<\/a> Qualys.<\/em><\/p>\n\n\n\n

Searches using Censys and Shodan have revealed over 14 million potentially vulnerable OpenSSH server instances exposed to the Internet. Data from Qualys CSAM 3.0 shows that around 700,000 of these are external internet-facing instances, representing 31% of all such instances in their global customer base. Notably, over 0.14% of these vulnerable instances are running an End-Of-Life\/End-Of-Support version of OpenSSH.<\/gwmw><\/p>\n\n\n\n

The flaw was introduced with the fix for another vulnerability, tracked as CVE-2006-5051<\/a>. This is a case of regression of a previously patched flaw, which means that a previously fixed bug has resurfaced in a later software release, often due to updates that unintentionally reintroduce the issue. The regression was introduced in October 2020 with the release of OpenSSH 8.5p1.<\/gwmw><\/gwmw><\/p>\n\n\n\n

Maintainers pointed out that OpenBSD systems are not impacted by this vulnerability. <\/gwmw>The latest release also addressed a Logic error in ssh(1) ObscureKeystrokeTiming. The flaw was discovered by Philippos Giavridis and also independently by Jacky Wei En Kung, Daniel Hugenroth and Alastair Beresford of the
University of Cambridge Computer Lab.

“In OpenSSH version 9.5 through 9.7 (inclusive), when connected to an OpenSSH server version 9.5 or later, a logic error in the
ssh(1)<\/a> ObscureKeystrokeTiming feature (on by default) rendered this feature
ineffective – a passive observer could still detect which network packets contained real keystrokes when the countermeasure was active because both fake and real keystroke packets were being sent unconditionally.” states the advisory<\/em>.
<\/gwmw><\/gwmw><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, OpenSSH server)<\/strong><\/gwmw><\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

A critical flaw in the OpenSSH server can be exploited to achieve unauthenticated remote code execution with root privileges in glibc-based Linux systems. OpenSSH maintainers addressed a critical vulnerability, tracked as CVE-2024-6387, that can lead to unauthenticated remote code execution with root privileges in glibc-based Linux systems. OpenSSH maintained have addressed the vulnerability with the […]<\/p>\n","protected":false},"author":1,"featured_media":38802,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,55],"tags":[4112,9508,10918,4023,15189,687,841,1533],"class_list":["post-165087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-security","tag-hacking","tag-hacking-news","tag-it-information-security","tag-openssh","tag-openssh-server","tag-pierluigi-paganini","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司