Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A new OpenSSH vulnerability could lead to RCE as root on Linux systems
Global Security

A new OpenSSH vulnerability could lead to RCE as root on Linux systems

AdminBy AdminJuly 7, 2024No Comments4 Mins Read
OpenSSH Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


OpenSSH vulnerability

OpenSSH has released security updates that contain a critical security flaw that could lead to unauthenticated remote code execution with root privileges on glibc-based Linux systems.

The vulnerability, codenamed regreSSHion, has been assigned the CVE ID CVE-2024-6387. It is located in OpenSSH server componentalso known as sshd, which is designed to listen for connections from any client application.

“A race condition vulnerability in the OpenSSH (sshd) server signal handler allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems,” said Bharat Jogi, senior director of threat research at Qualys. said in a disclosure released today. “This race condition affects sshd in its default configuration.”

The cybersecurity firm said it had identified at least 14 million potentially vulnerable instances of OpenSSH servers exposed to the Internet, adding that it was a regression of an already patched 18-year-old flaw tracked as CVE-2006-5051with the issue restored in October 2020 as part of OpenSSH version 8.5p1.

Cyber ​​security

“Successful use has been demonstrated on 32-bit Linux/glibc systems with (address space location randomization),” OpenSSH said in the advisory. “In lab conditions, the attack requires an average of 6-8 hours of continuous connections to the maximum the server can handle.”

The vulnerability affects versions between 8.5p1 and 9.7p1. Versions prior to 4.4p1 are also vulnerable to a race condition bug unless fixed for CVE-2006-5051 and CVE-2008-4109. It should be noted that OpenBSD systems are not affected as they include a security mechanism that blocks the flaw.

It is likely that the security flaw also affects both macOS and Windows, although its exploitability on these platforms remains unconfirmed and requires further analysis.

Specifically, Qualys discovered that if the client does not authenticate within 120 seconds (a parameter defined by LoginGraceTime), then sshd’s SIGALRM handler is called asynchronously in a way that does not asynchronous signal-safe.

The net effect of exploiting CVE-2024-6387 is complete system compromise and hijacking, allowing threat actors to execute arbitrary code with the highest privileges, subvert security mechanisms, steal data, and even maintain persistent access.

“A flaw that was fixed would reappear in a subsequent software release, usually due to changes or updates that inadvertently reintroduced the problem,” Jogi said. “This incident highlights the critical role of thorough regression testing to prevent the re-introduction of known vulnerabilities into the environment.”

​​​​​​While the vulnerability has significant obstacles due to the nature of remote race conditions, users are encouraged to apply the latest patches to protect against potential threats. It is also recommended to restrict SSH access using network management tools and force network segmentation to limit unauthorized access and lateral movement.

Update

Cyber ​​security firms A division of Palo Alto Networks 42 and Wiz stated that the vulnerability is unlikely to be widely or opportunistically exploited, given that an attacker would need to know in advance which Linux distribution they are targeting in order to create a functional exploit.

Cyber ​​security

Another factor that may prevent its mass exploitation is the fact that an attack can take up to eight hours and require up to 10,000 authentication steps, as noted Kaspersky, although this does not exclude the possibility of very targeted exploitation.

“The specific nature of the race conditions and their operation require a significant number of attempts to successfully execute, with varying success rates depending on version and environment,” Oligo said. said.

Akamai, in its own advisory, noted that the root cause of the problem is a race condition caused by unsafe signal handling when waiting for user authentication.

“After a timeout, a SIGALRM signal is generated, causing the thread executing the heap management routine to abort” is explained. “If the signal handler itself calls the heap management routine, it can cause unexpected behavior and, in this case, arbitrary code execution.”

OpenSSF’s Omhar Arasaratnam said the OpenSSH vulnerability highlights the importance of maintaining secure open source development practices, especially in “long-standing projects that are foundational to companies around the world.”

“It’s also a reminder that not all vulnerabilities are malicious, as we saw recently with XZ Utils,” he said. “Code regressions are common, so ongoing thorough testing is an important step that cannot be ignored.”

“The open source community must also remain vigilant in evaluating the open source code they use, staying abreast of updates, and following the principles of secure software development.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.