The maintainers of the FreeBSD Project have released urgent security updates to address a high-severity flaw, tracked as\u00a0CVE-2024-7589, (CVSS score of 7.4) in OpenSSH. A remote attacker could exploit the vulnerability to execute arbitrary code with elevated privileges.<\/p>\n\n\n\n
OpenSSH is an implementation of the SSH protocol suite that offers encrypted and authenticated transport for various services, including remote shell access.<\/p>\n\n\n\n
“A signal handler in sshd(8) may call a logging function that is not async- signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)’s privileged code, which is not sandboxed and runs with full root privileges.” reads the advisory<\/a>. “This issue is another instance of the problem in CVE-2024-6387<\/a> addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD.”<\/em><\/p>\n\n\n\n
CVE-2024-7589 stems from
CVE-2024-6387<\/a> (aka regreSSHion), which was disclosed in July that can lead to unauthenticated remote code execution with root privileges in glibc-based Linux systems.<\/p>\n\n\n\n
Follow me on Twitter:
@securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, OpenSSH)<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"