2024-07-25 21:25:12 +00:00
### [CVE-2024-6387](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387)
2024-08-05 18:41:32 +00:00

2024-07-25 21:25:12 +00:00

2024-08-05 18:41:32 +00:00

2024-07-25 21:25:12 +00:00












### Description
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
### POC
#### Reference
2024-08-10 19:04:30 +00:00
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
2024-07-25 21:25:12 +00:00
- http://www.openwall.com/lists/oss-security/2024/07/03/5
2024-08-05 18:41:32 +00:00
- http://www.openwall.com/lists/oss-security/2024/07/28/2
2024-07-25 21:25:12 +00:00
- https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
2024-08-24 17:55:21 +00:00
- https://github.com/zgzhang/cve-2024-6387-poc
2024-08-06 19:19:10 +00:00
- https://news.ycombinator.com/item?id=40843778
2024-08-05 18:41:32 +00:00
- https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
2024-07-25 21:25:12 +00:00
- https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html
#### Github
2024-08-05 18:41:32 +00:00
- https://github.com/0xMarcio/cve
- https://github.com/CVEDB/awesome-cve-repo
2024-07-25 21:25:12 +00:00
- https://github.com/David-M-Berry/openssh-cve-discovery
2024-08-22 18:33:16 +00:00
- https://github.com/EGI-Federation/SVG-advisories
2024-07-25 21:25:12 +00:00
- https://github.com/GhostTroops/TOP
- https://github.com/GitHubForSnap/openssh-server-gael
- https://github.com/Ostorlab/KEV
- https://github.com/Passyed/regreSSHion-Fix
- https://github.com/TAM-K592/CVE-2024-6387
- https://github.com/ThemeHackers/CVE-2024-6387
- https://github.com/Threekiii/CVE
- https://github.com/TrojanAZhen/Self_Back
2024-08-21 13:32:10 +00:00
- https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
2024-07-25 21:25:12 +00:00
- https://github.com/azurejoga/CVE-2024-6387-how-to-fix
2024-08-17 18:41:15 +00:00
- https://github.com/beac0n/ruroco
2024-07-25 21:25:12 +00:00
- https://github.com/bigb0x/CVE-2024-6387
2024-08-25 17:33:10 +00:00
- https://github.com/bigb0x/OpenSSH-Scanner
2024-08-06 19:19:10 +00:00
- https://github.com/cybereagle2001/KQL-Security-Querries
2024-07-25 21:25:12 +00:00
- https://github.com/enomothem/PenTestNote
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
2024-08-05 18:41:32 +00:00
- https://github.com/kalvin-net/NoLimit-Secu-RegreSSHion
2024-07-25 21:25:12 +00:00
- https://github.com/lukibahr/stars
- https://github.com/maycon/stars
- https://github.com/nomi-sec/PoC-in-GitHub
2024-08-05 18:41:32 +00:00
- https://github.com/rxerium/stars
2024-08-25 17:33:10 +00:00
- https://github.com/ryanalieh/openSSH-scanner
2024-08-27 19:05:50 +00:00
- https://github.com/rylei-m/USU_2024_PS1_Script_For_SSH
2024-08-21 13:32:10 +00:00
- https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH
2024-07-25 21:25:12 +00:00
- https://github.com/sardine-web/CVE-2024-6387_Check
- https://github.com/tanjiti/sec_profile
- https://github.com/teamos-hub/regreSSHion
- https://github.com/trailofbits/codeql-queries