40 lines
1.7 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-51767",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-24T07:15:07.410",
"lastModified": "2023-12-26T17:15:08.337",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges."
},
{
"lang": "es",
"value": "OpenSSH hasta 9.6, cuando se utilizan tipos comunes de DRAM, podr\u00eda permitir row hammer attacks (para omitir la autenticaci\u00f3n) porque el valor entero de autenticado en mm_answer_authpassword no resiste cambios de un solo bit. NOTA: esto es aplicable a un determinado modelo de amenaza de ubicaci\u00f3n conjunta entre atacante y v\u00edctima en el que el atacante tiene privilegios de usuario."
}
],
"metrics": {},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-51767",
"source": "cve@mitre.org"
},
{
"url": "https://arxiv.org/abs/2309.02545",
"source": "cve@mitre.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"source": "cve@mitre.org"
}
]
}