Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade openssh-portable
to version 9.8p1 or higher.
Affected versions of this package are vulnerable to Race Condition in OpenSSH's server (sshd) due to a signal handler race condition when a client does not authenticate within LoginGraceTime
seconds (120 by default, 600 in old OpenSSH versions).
An attacker can execute arbitrary code as root by exploiting the asynchronous call of the SIGALRM
handler, which invokes functions that are not async-signal-safe, such as syslog()
. This vulnerability can be exploited by repeated connection attempts that exploit the inconsistent state caused by the interrupted signal handler.
This vulnerability mainly derives from the accidental removal of the #ifdef DO_LOG_SAFE_IN_SIGHAND
from sigdie()
Note:
Under lab conditions, the attack requires, on average, 6-8 hours of continuous connections up to the maximum the server will accept.
OpenBSD is notably not vulnerable.
This vulnerability is exploitable remotely on glibc-based Linux systems, where syslog()
itself calls async-signal-unsafe functions (for example, malloc()
and free()
)
Successful exploitation has been demonstrated on 32-bit Linux/glibc systems with ASLR.
Exploitation on 64-bit systems is believed to be possible but has not been demonstrated at this time.
Systems that lack ASLR or users of downstream Linux distributions that have modified OpenSSH to disable per-connection ASLR re-randomization may potentially have an easier path to exploitation.