Логотип exploitDog
bind:"CVE-2024-6409"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-6409"

Количество 8

Количество 8

ubuntu логотип

CVE-2024-6409

12 месяцев назад

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
EPSS: Высокий
redhat логотип

CVE-2024-6409

12 месяцев назад

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
EPSS: Высокий
nvd логотип

CVE-2024-6409

12 месяцев назад

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
EPSS: Высокий
debian логотип

CVE-2024-6409

12 месяцев назад

A race condition vulnerability was discovered in how signals are handl ...

CVSS3: 7
EPSS: Высокий
rocky логотип

RLSA-2024:4457

11 месяцев назад

Moderate: openssh security update

EPSS: Высокий
github логотип

GHSA-79hg-h6r6-64mm

12 месяцев назад

A signal handler race condition vulnerability was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). This issue leaves it vulnerable to a signal handler race condition on the cleanup_exit() function, which introduces the same vulnerability as CVE-2024-6387 in the unprivileged child of the SSHD server.

CVSS3: 7
EPSS: Высокий
oracle-oval логотип

ELSA-2024-4457

12 месяцев назад

ELSA-2024-4457: openssh security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-05181

12 месяцев назад

Уязвимость обработчика прерываний SIGALRM средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

CVSS3: 7
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-6409

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
70%
Высокий
12 месяцев назад
redhat логотип
CVE-2024-6409

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
70%
Высокий
12 месяцев назад
nvd логотип
CVE-2024-6409

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
70%
Высокий
12 месяцев назад
debian логотип
CVE-2024-6409

A race condition vulnerability was discovered in how signals are handl ...

CVSS3: 7
70%
Высокий
12 месяцев назад
rocky логотип
RLSA-2024:4457

Moderate: openssh security update

70%
Высокий
11 месяцев назад
github логотип
GHSA-79hg-h6r6-64mm

A signal handler race condition vulnerability was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). This issue leaves it vulnerable to a signal handler race condition on the cleanup_exit() function, which introduces the same vulnerability as CVE-2024-6387 in the unprivileged child of the SSHD server.

CVSS3: 7
70%
Высокий
12 месяцев назад
oracle-oval логотип
ELSA-2024-4457

ELSA-2024-4457: openssh security update (MODERATE)

12 месяцев назад
fstec логотип
BDU:2024-05181

Уязвимость обработчика прерываний SIGALRM средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

CVSS3: 7
70%
Высокий
12 месяцев назад

Уязвимостей на страницу