136 lines
4.2 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-6387",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-07-01T13:15:06.467",
"lastModified": "2024-07-01T19:15:06.037",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog()."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-364"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/12",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6387",
"source": "secalert@redhat.com"
},
{
"url": "https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/",
"source": "secalert@redhat.com"
},
{
"url": "https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"source": "secalert@redhat.com"
},
{
"url": "https://explore.alas.aws.amazon.com/CVE-2024-6387.html",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/oracle/oracle-linux/issues/149",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/rapier1/hpn-ssh/issues/87",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/zgzhang/cve-2024-6387-poc",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html",
"source": "secalert@redhat.com"
},
{
"url": "https://news.ycombinator.com/item?id=40843778",
"source": "secalert@redhat.com"
},
{
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010",
"source": "secalert@redhat.com"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2024-6387",
"source": "secalert@redhat.com"
},
{
"url": "https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
"source": "secalert@redhat.com"
},
{
"url": "https://ubuntu.com/security/CVE-2024-6387",
"source": "secalert@redhat.com"
},
{
"url": "https://ubuntu.com/security/notices/USN-6859-1",
"source": "secalert@redhat.com"
},
{
"url": "https://www.openssh.com/txt/release-9.8",
"source": "secalert@redhat.com"
},
{
"url": "https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"source": "secalert@redhat.com"
},
{
"url": "https://www.suse.com/security/cve/CVE-2024-6387.html",
"source": "secalert@redhat.com"
},
{
"url": "https://www.theregister.com/2024/07/01/regresshion_openssh/",
"source": "secalert@redhat.com"
}
]
}