2024-07-01 14:05:25 +00:00
{
"id" : "CVE-2024-6387" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2024-07-01T13:15:06.467" ,
2024-07-04 04:04:25 +00:00
"lastModified" : "2024-07-04T03:15:02.100" ,
2024-07-01 20:04:24 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-07-01 14:05:25 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
2024-07-02 23:58:27 +00:00
"value" : "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period."
2024-07-02 16:03:39 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se encontr\u00f3 una condici\u00f3n de ejecuci\u00f3n del controlador de se\u00f1ales en el servidor de OpenSSH (sshd), donde un cliente no se autentica dentro de los segundos de LoginGraceTime (120 de forma predeterminada, 600 en versiones anteriores de OpenSSH), luego se llama al controlador SIGALRM de sshd de forma asincr\u00f3nica. Sin embargo, este controlador de se\u00f1ales llama a varias funciones que no son seguras para se\u00f1ales as\u00edncronas, por ejemplo, syslog()."
2024-07-01 14:05:25 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "secalert@redhat.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.2 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "secalert@redhat.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-364"
}
]
}
] ,
"references" : [
2024-07-01 20:04:24 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/07/01/12" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 23:58:40 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/07/01/13" ,
"source" : "secalert@redhat.com"
} ,
2024-07-02 16:03:39 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/07/02/1" ,
"source" : "secalert@redhat.com"
} ,
2024-07-03 10:04:13 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/07/03/1" ,
"source" : "secalert@redhat.com"
} ,
2024-07-03 23:58:47 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/07/03/11" ,
"source" : "secalert@redhat.com"
} ,
2024-07-03 10:04:13 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/07/03/2" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2024/07/03/3" ,
"source" : "secalert@redhat.com"
} ,
2024-07-03 14:05:06 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/07/03/4" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2024/07/03/5" ,
"source" : "secalert@redhat.com"
} ,
2024-07-04 04:04:25 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/07/04/1" ,
"source" : "secalert@redhat.com"
} ,
2024-07-03 18:04:02 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:4312" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 14:05:25 +00:00
{
"url" : "https://access.redhat.com/security/cve/CVE-2024-6387" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 20:04:24 +00:00
{
"url" : "https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/" ,
"source" : "secalert@redhat.com"
} ,
2024-07-03 22:04:21 +00:00
{
"url" : "https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 20:04:24 +00:00
{
"url" : "https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 14:05:25 +00:00
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2294604" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 20:04:24 +00:00
{
"url" : "https://explore.alas.aws.amazon.com/CVE-2024-6387.html" ,
"source" : "secalert@redhat.com"
} ,
2024-07-02 20:03:23 +00:00
{
"url" : "https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc" ,
"source" : "secalert@redhat.com"
} ,
2024-07-03 22:04:21 +00:00
{
"url" : "https://github.com/AlmaLinux/updates/issues/629" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://github.com/Azure/AKS/issues/4379" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://github.com/PowerShell/Win32-OpenSSH/discussions/2248" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://github.com/PowerShell/Win32-OpenSSH/issues/2249" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://github.com/microsoft/azurelinux/issues/9555" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 20:04:24 +00:00
{
"url" : "https://github.com/oracle/oracle-linux/issues/149" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://github.com/rapier1/hpn-ssh/issues/87" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://github.com/zgzhang/cve-2024-6387-poc" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://news.ycombinator.com/item?id=40843778" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://security-tracker.debian.org/tracker/CVE-2024-6387" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 23:58:40 +00:00
{
"url" : "https://security.netapp.com/advisory/ntap-20240701-0001/" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 20:04:24 +00:00
{
"url" : "https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://ubuntu.com/security/CVE-2024-6387" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://ubuntu.com/security/notices/USN-6859-1" ,
"source" : "secalert@redhat.com"
} ,
2024-07-02 20:03:23 +00:00
{
"url" : "https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 20:04:24 +00:00
{
"url" : "https://www.openssh.com/txt/release-9.8" ,
"source" : "secalert@redhat.com"
} ,
2024-07-01 14:05:25 +00:00
{
"url" : "https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt" ,
"source" : "secalert@redhat.com"
2024-07-01 20:04:24 +00:00
} ,
{
"url" : "https://www.suse.com/security/cve/CVE-2024-6387.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://www.theregister.com/2024/07/01/regresshion_openssh/" ,
"source" : "secalert@redhat.com"
2024-07-01 14:05:25 +00:00
}
]
}