Логотип exploitDog
bind:"CVE-2024-6409"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-6409"

Количество 8

Количество 8

ubuntu логотип

CVE-2024-6409

около 1 года назад

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
EPSS: Средний
redhat логотип

CVE-2024-6409

около 1 года назад

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
EPSS: Средний
nvd логотип

CVE-2024-6409

около 1 года назад

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
EPSS: Средний
debian логотип

CVE-2024-6409

около 1 года назад

A race condition vulnerability was discovered in how signals are handl ...

CVSS3: 7
EPSS: Средний
rocky логотип

RLSA-2024:4457

около 1 года назад

Moderate: openssh security update

EPSS: Средний
github логотип

GHSA-79hg-h6r6-64mm

около 1 года назад

A signal handler race condition vulnerability was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). This issue leaves it vulnerable to a signal handler race condition on the cleanup_exit() function, which introduces the same vulnerability as CVE-2024-6387 in the unprivileged child of the SSHD server.

CVSS3: 7
EPSS: Средний
oracle-oval логотип

ELSA-2024-4457

около 1 года назад

ELSA-2024-4457: openssh security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-05181

около 1 года назад

Уязвимость обработчика прерываний SIGALRM средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

CVSS3: 7
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-6409

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
59%
Средний
около 1 года назад
redhat логотип
CVE-2024-6409

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
59%
Средний
около 1 года назад
nvd логотип
CVE-2024-6409

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

CVSS3: 7
59%
Средний
около 1 года назад
debian логотип
CVE-2024-6409

A race condition vulnerability was discovered in how signals are handl ...

CVSS3: 7
59%
Средний
около 1 года назад
rocky логотип
RLSA-2024:4457

Moderate: openssh security update

59%
Средний
около 1 года назад
github логотип
GHSA-79hg-h6r6-64mm

A signal handler race condition vulnerability was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). This issue leaves it vulnerable to a signal handler race condition on the cleanup_exit() function, which introduces the same vulnerability as CVE-2024-6387 in the unprivileged child of the SSHD server.

CVSS3: 7
59%
Средний
около 1 года назад
oracle-oval логотип
ELSA-2024-4457

ELSA-2024-4457: openssh security update (MODERATE)

около 1 года назад
fstec логотип
BDU:2024-05181

Уязвимость обработчика прерываний SIGALRM средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

CVSS3: 7
59%
Средний
около 1 года назад

Уязвимостей на страницу