Fix Available for Double Free Vulnerability in OpenSSH 9.1 (CVE-2023-25136) - SOCRadar® Cyber Intelligence Inc. (2024)

Fix Available for Double Free Vulnerability in OpenSSH 9.1 (CVE-2023-25136) - SOCRadar® Cyber Intelligence Inc. (1)

CVE-2023-25136, a pre-authentication double-free vulnerability, has been fixed inOpenSSH version 9.2p1. The vulnerability is highly severe, with aCVSS score of 9.8,and could be used to cause a denial-of-service (DoS) orremote code execution (RCE).

OpenSSH is a free andopen-source toolfor secure remote communication and access. Administrators and developers widely use it, and it is compatible with various operating systems.

CVE-2023-25136affects the default configuration of OpenSSH version 9.1p1 (sshd).

How Does the CVE-2023-25136 Work?

The double-freevulnerabilitywas discovered by Mantas Mikulenas and reported toOpenSSH Bugzillain January 2023. The vulnerability was introduced in July 2022 and is caused by freeing the same memory location twice, which in this case is “options.kex_algorithms.” The first instance of freeing occurs through thedo_ssh2_kex()function, which subsequently callscompat_kex_proposal().

When the compatibility bit “SSH_BUG_CURVE25519PAD” is not set and the compatibility bit “SSH_OLD_DHGEX” is set, “options.kex_algorithms” becomes a dangling pointer after being freed. This leads to the memory being freed again throughkex_assemble_names()with “listp” being equal to “&options.kex_algorithms.

Is it Easy to Exploit?

OpenSSH employs security mechanisms such as sandboxing and privilege separation, so creating a successful exploit can be difficult. Aside from its difficulty, thepre-auth double-free vulnerability, CVE-2023-25136, could be exploited for remote code execution (RCE) ordenial-of-service(DoS) attacks.

In the event of aDoS attack, only the forked daemons crash due to a sandbox violation when attempting to executewritev(), while the main server daemon remains unaffected and can handle new clients.

Proof-of-Concept is Available

JFroghas provided a detailed analysis and proof-of-concept for the CVE-2023-25136 vulnerability, which is available onGitHub.

The DoS proof-of-concept triggers the double-free vulnerability using the paramiko package, resulting in an abort crash. The connecting client version banner is changed to reflect an outdated client such as PuTTY v0.64.

The RCE exploit works by allocating another struct namedEVP_AES_KEYinstead of the freedoptions.kex_algorithms. It is later freed again when the double-free occurs and then overwritten with another chunk using theauthctxt->user or authctxt->style.

WhenEVP_Cipher()attempts to use theEVP_AES_KEY, it will use this overwritten chunk with attacker-controlled data.

Qualys Security has been able to use this double-free vulnerability to achieve limited remote code execution exploits when no memory protections such as ASLR or NX are applied.

Apply the Fix

The best way to protect yourself from this vulnerability is to update the latest version. Users are advised to update as soon as possible to ensure that their systems are not vulnerable to attack.

OpenSSH issued asecurity advisoryon February 2, 2023, announcing the release of version 9.2p1. They noted that this version was significant due to the pre-auth double-free vulnerability (CVE-2023-25136). You can find the fix for this vulnerability by examining thecommitmade in OpenSSH’s GitHub repository.

How Can SOCRadar Help?

SOCRadar is an Extended Threat Intelligence platform that updates you on the latest security threats and vulnerabilities. It gathers data on all known vulnerabilities and presents it in an easy-to-use format, using alerts to help you prioritize your actions and inform you of potential risks to your organization. You can use SOCRadar’sVulnerability Intelligencemodule to get detailed information on vulnerabilities, which can aid you in managing related issues and prioritizing patches when required.

Fix Available for Double Free Vulnerability in OpenSSH 9.1 (CVE-2023-25136) - SOCRadar® Cyber Intelligence Inc. (2)

Moreover, itsExternal Attack Surface Management (EASM)functionality can identify your digital assets and notify you of any potential threats.

Fix Available for Double Free Vulnerability in OpenSSH 9.1 (CVE-2023-25136) - SOCRadar® Cyber Intelligence Inc. (3)
Fix Available for Double Free Vulnerability in OpenSSH 9.1 (CVE-2023-25136) - SOCRadar® Cyber Intelligence Inc. (4)
Fix Available for Double Free Vulnerability in OpenSSH 9.1 (CVE-2023-25136) - SOCRadar® Cyber Intelligence Inc. (2024)

FAQs

What is the CVE vulnerability in OpenSSH? ›

CVE-2024-6387 is a vulnerability in OpenSSH servers (sshd) in 32-bit Linux/glibc systems. If exploited, the vulnerability facilitates Remote Code Execution with full root privileges, classifying it as a high-severity exposure (CVSS 8.1). CVE-2024-6387 (discovered on 1 July 2024) isn't an entirely new exposure.

What is the RCE vulnerability in OpenSSH server? ›

The vulnerability, which is a signal handler race condition in OpenSSH's server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems; that presents a significant security risk. This race condition affects sshd in its default configuration.

What is CVE 2023 28531? ›

ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints.

What is CVE 2023 48795? ›

The discovery of CVE-2023-48795 via the Terrapin Attacks highlights how even SSH is vulnerable, underscoring the importance and continued relevance of advanced vulnerability management patching strategies and vulnerability prioritization, especially for hybrid enterprise environments.

Which version of OpenSSH is safe? ›

OpenSSH versions earlier than 4.4p1 are vulnerable to this signal handler race condition unless they are patched for CVE-2006-5051 and CVE-2008-4109. Versions from 4.4p1 up to, but not including, 8.5p1 are not vulnerable due to a transformative patch for CVE-2006-5051, which made a previously unsafe function secure.

What is the latest exploit of OpenSSH? ›

‍Impact of CVE-2024-6387

Once successfully exploited, it results in complete system compromise, granting attackers unrestricted access to execute any code with the highest level of privileges. This allows them to deploy malware, extract sensitive data, and establish persistent backdoors for future exploitation.

What is OpenSSH used for? ›

OpenSSH is a free SSH protocol suite providing encryption for network services like remote login or remote file transfers. The OpenSSH source code is available free to everyone via the Internet. This encourages code reuse and code auditing.

What attacks is SSH vulnerable to? ›

SSH session hijacking and unauthorized access: Attackers can hijack a user's SSH session by exploiting the trusted communication established between multiple systems via public key authentication in an SSH session. It can occur either by hijacking the SSH agent or by gaining unauthorized access to the agent's socket.

How to check OpenSSH version? ›

Local OpenSSH version

The easiest way to find the installed OpenSSH version is using the ssh -V command. This works when being logged in to the system itself. So this system is running the 8.9p1 version of OpenSSH.

What is CVE 2023 51384? ›

CVE-2023-51384 is a medium-severity vulnerability affecting OpenSSH before version 9.6 and certain Debian Linux systems. This vulnerability can lead to the disclosure of sensitive information or the addition or modification of data.

What is CVE 2023 23529? ›

CVE-2023-23529 is a high-severity vulnerability affecting various Apple products, including iOS, iPadOS, macOS, and Safari. This type confusion issue could lead to arbitrary code execution when processing malicious web content.

What is CVE 2023 26360? ›

In summary, CVE-2023-26360 revealed a severe unauthenticated Remote Code Execution (RCE) threat in ColdFusion. Exploited by SectorB01, this vulnerability affects both the 2018 and 2021 versions, posing a significant risk to US government agencies.

What is CVE 2023 51385? ›

In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations.

What ciphers are affected by CVE 2023 48795? ›

CVE-2023-48795 Overview

There are two vulnerable OpenSSH configurations: ChaCha20-Poly1305. Any aes(128|192|256)-cbc ciphers using the default MACs (or any MAC that uses Encrypt-then-MAC, EtM, for example – hmac-sha2-256-etm@openssh.com ).

What is the Terrapin issue in OpenSSH? ›

The Terrapin attack exploits weaknesses in the SSH transport layer protocol in combination with newer cryptographic algorithms and encryption modes introduced by OpenSSH over 10 years ago.

What is a CVE vulnerability? ›

CVE stands for Common Vulnerabilities and Exposures. CVE is a glossary that classifies vulnerabilities. The glossary analyzes vulnerabilities and then uses the Common Vulnerability Scoring System (CVSS) to evaluate the threat level of a vulnerability.

What is the OpenSSH 8.8 vulnerability? ›

The vulnerability affects versions 8.7p1 and 8.8p1, shipped with Red Hat Enterprise Linux 9 (RHEL 9). The flaw in OpenSSH allows an attacker to execute malicious code on a system where they can already run their own code.

What are the vulnerabilities of SSH? ›

A Race condition vulnerability exists in sshd(8), which could allow for unauthenticated remote code execution in OpenSSH's server (sshd) that grants full root access. It affects the default configuration and does not require user interaction. It poses a significant exploit risk. (CVE-2024-6387)

What is the vulnerability in OpenSSH regression? ›

The regreSSHion (CVE-2024-6387) vulnerability is an unauthenticated remote code execution flaw found in OpenSSH servers (sshd) on glibc-based Linux systems. If exploited, it allows full root access to the targeted machine without user interaction. This vulnerability is classified as High severity (CVSS 8.1).

Top Articles
10 Foods and Drinks To Avoid For A Flat Stomach – BEMORE STUDIO
This Is The #1 Vegan City In America 
Menards Thermal Fuse
Www.1Tamilmv.cafe
jazmen00 x & jazmen00 mega| Discover
Horoscopes and Astrology by Yasmin Boland - Yahoo Lifestyle
Blairsville Online Yard Sale
Mylaheychart Login
What happens if I deposit a bounced check?
Directions To 401 East Chestnut Street Louisville Kentucky
Yi Asian Chinese Union
Think Of As Similar Crossword
litter - tłumaczenie słowa – słownik angielsko-polski Ling.pl
Craigslist Greenville Craigslist
FAQ: Pressure-Treated Wood
The Witcher 3 Wild Hunt: Map of important locations M19
Ts Lillydoll
Curtains - Cheap Ready Made Curtains - Deconovo UK
Slope Tyrones Unblocked Games
Missouri Highway Patrol Crash
How To Level Up Roc Rlcraft
Uconn Health Outlook
Scout Shop Massapequa
Forest Biome
Morristown Daily Record Obituary
Orange Pill 44 291
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Filthy Rich Boys (Rich Boys Of Burberry Prep #1) - C.M. Stunich [PDF] | Online Book Share
Https E22 Ultipro Com Login Aspx
The Collective - Upscale Downtown Milwaukee Hair Salon
Sams Gas Price Sanford Fl
TMO GRC Fortworth TX | T-Mobile Community
Tim Steele Taylorsville Nc
Spirited Showtimes Near Marcus Twin Creek Cinema
Solarmovie Ma
Justin Mckenzie Phillip Bryant
Car Crash On 5 Freeway Today
Cross-Border Share Swaps Made Easier Through Amendments to India’s Foreign Exchange Regulations - Transatlantic Law International
#1 | Rottweiler Puppies For Sale In New York | Uptown
Marcus Roberts 1040 Answers
Oriellys Tooele
The TBM 930 Is Another Daher Masterpiece
Atlanta Musicians Craigslist
South Bend Tribune Online
Updates on removal of DePaul encampment | Press Releases | News | Newsroom
Janaki Kalaganaledu Serial Today Episode Written Update
Shipping Container Storage Containers 40'HCs - general for sale - by dealer - craigslist
Waco.craigslist
Latina Webcam Lesbian
Online TikTok Voice Generator | Accurate & Realistic
Smoke From Street Outlaws Net Worth
Zits Comic Arcamax
Latest Posts
Article information

Author: Duane Harber

Last Updated:

Views: 6084

Rating: 4 / 5 (71 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Duane Harber

Birthday: 1999-10-17

Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

Phone: +186911129794335

Job: Human Hospitality Planner

Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.