Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-7589

Опубликовано: 12 авг. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.1

Описание

A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges. This issue is another instance of the problem in CVE-2024-6387 addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD. As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root.

РелизСтатусПримечание
devel

not-affected

only affects OpenSSH on FreeBSD
esm-infra-legacy/trusty

not-affected

only affects OpenSSH on FreeBSD
esm-infra/bionic

not-affected

only affects OpenSSH on FreeBSD
esm-infra/focal

not-affected

only affects OpenSSH on FreeBSD
esm-infra/xenial

not-affected

only affects OpenSSH on FreeBSD
fips-updates/bionic

not-affected

only affects OpenSSH on FreeBSD
fips-updates/focal

not-affected

only affects OpenSSH on FreeBSD
fips-updates/xenial

not-affected

only affects OpenSSH on FreeBSD
fips/bionic

not-affected

only affects OpenSSH on FreeBSD
fips/focal

not-affected

only affects OpenSSH on FreeBSD

Показывать по

РелизСтатусПримечание
devel

not-affected

only affects OpenSSH on FreeBSD
esm-apps/bionic

not-affected

only affects OpenSSH on FreeBSD
esm-apps/focal

not-affected

only affects OpenSSH on FreeBSD
esm-apps/jammy

not-affected

only affects OpenSSH on FreeBSD
esm-apps/noble

not-affected

only affects OpenSSH on FreeBSD
focal

not-affected

only affects OpenSSH on FreeBSD
jammy

not-affected

only affects OpenSSH on FreeBSD
noble

not-affected

only affects OpenSSH on FreeBSD
upstream

ignored

frozen on openssh 7.5p

Показывать по

Ссылки на источники

EPSS

Процентиль: 83%
0.01906
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
12 месяцев назад

A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges. This issue is another instance of the problem in CVE-2024-6387 addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD. As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root.

CVSS3: 8.1
nvd
12 месяцев назад

A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges. This issue is another instance of the problem in CVE-2024-6387 addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD. As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root.

CVSS3: 8.1
debian
12 месяцев назад

A signal handler in sshd(8) may call a logging function that is not as ...

CVSS3: 8.1
github
12 месяцев назад

A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges. This issue is another instance of the problem in CVE-2024-6387 addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD. As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root.

CVSS3: 8.1
fstec
12 месяцев назад

Уязвимость обработчика сигналов в sshd(8) операционной системы FreeBSD, позволяющая нарушителю выполнить произвольный код в контексте root

EPSS

Процентиль: 83%
0.01906
Низкий

8.1 High

CVSS3