Critical vulnerability in openssh "regreSSHion"

Status
Not open for further replies.

aniglo22

🗣️ Loud Newcomer
May 28, 2025
518
0
36
CVE-2024-6387
Check your servers !!
  • Affected Versions: OpenSSH 8.5p1 to 9.8p1.
  • Exploit: Remote code execution as root due to the vulnerable SIGALRM handler calling async-signal-unsafe functions.
 
Also a reminder to not expose SSH to the world but only to a jump server. Workaround is available by setting LoginGraceTime to 0 in /etc/ssh/sshd_config.
 
1719954400904.webp




https://xkcd.com/2347/
 
This is a 2nd significant and sofisticated OpenSSH vulnerability after CVE-2024-3094. These vulnerabilities do not exist in ssh from www.ssh.com 🙄 Questions about open source reliability should be asked.

aniglo22 said:
CVE-2024-6387
Check your servers !!
  • Affected Versions: OpenSSH 8.5p1 to 9.8p1.
  • Exploit: Remote code execution as root due to the vulnerable SIGALRM handler calling async-signal-unsafe functions.
Click to expand...

This particular is actualy an unforeseen consequence of a patch for CVE-2006-5051 hence it affects mainly OpenSSH versions on x86 - 32 bit hw platforms. Theoretical risk exist for x86-64 ones.

0xDEADBEEF said:
Also a reminder to not expose SSH to the world but only to a jump server. Workaround is available by setting LoginGraceTime to 0 in /etc/ssh/sshd_config.
Click to expand...

Generaly, a proper mitigation that we use always and not only for this vulnerability 😉 But for this types of attacks, a key is to have a firewall with rate limiter - intermediate server is quality solution with added value and multi-factor authentication.

Last edited: Jul 3, 2024
 
Status
Not open for further replies.

JohnnyDoe.is is an uncensored discussion forum
focused on free speech,
independent thinking, and controversial ideas.
Everyone is responsible for their own words.

Quick Navigation

User Menu