Critical vulnerability in openssh "regreSSHion"

Status
Not open for further replies.

aniglo22

🧠 Recognized Voice
Jan 22, 2024
649
0
36
CVE-2024-6387
Check your servers !!
  • Affected Versions: OpenSSH 8.5p1 to 9.8p1.
  • Exploit: Remote code execution as root due to the vulnerable SIGALRM handler calling async-signal-unsafe functions.
 
Also a reminder to not expose SSH to the world but only to a jump‌ server. Workaround is available by setting LoginGraceTime to 0 in /etc/ssh/sshd_config.
 
This is a 2nd significant and sofisticated OpenSSH vulnerability after CVE-2024-3094. These vulnerabilities do not‌ exist in ssh from www.ssh.com 🙄 Questions about open source reliability should be asked.

This particular is actualy an unforeseen consequence of a patch for CVE-2006-5051 hence it⁣ affects mainly OpenSSH versions on x86 - 32 bit hw platforms. Theoretical risk exist for⁢ x86-64 ones.

Generaly, a proper mitigation that we use always and not only for︂ this vulnerability 😉 But for this types of attacks, a key is to have a firewall︃ with rate limiter - intermediate server is quality solution with added value and multi-factor authentication.︄
 
Status
Not open for further replies.

JohnnyDoe.is is an uncensored discussion forum
focused on free speech,
independent thinking, and controversial ideas.
Everyone is responsible for their own words.

Quick Navigation

User Menu