28 lines
1.0 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-51767",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-24T07:15:07.410",
"lastModified": "2023-12-24T07:15:07.410",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://arxiv.org/abs/2309.02545",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"source": "cve@mitre.org"
}
]
}