❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 3 July 2024Main stream
Yesterday β€” 2 July 2024Main stream

β€œRegreSSHion” vulnerability in OpenSSH gives attackers root on Linux

2 July 2024 at 15:03
β€œRegreSSHion” vulnerability in OpenSSH gives attackers root on Linux

Enlarge

Researchers have warned of a critical vulnerability affecting the OpenSSH networking utility that can be exploited to give attackers complete control of Linux and Unix servers with no authentication required.

The vulnerability, tracked as CVE-2024-6387, allows unauthenticated remote code execution with root system rights on Linux systems that are based on glibc, an open source implementation of the C standard library. The vulnerability is the result of a code regression introduced in 2020 that reintroduced CVE-2006-5051, a vulnerability that was fixed in 2006. With thousands, if not millions, of vulnerable servers populating the Internet, this latest vulnerability could pose a significant risk.

Complete system takeover

β€œThis vulnerability, if exploited, could lead to full system compromise where an attacker can execute arbitrary code with the highest privileges, resulting in a complete system takeover, installation of malware, data manipulation, and the creation of backdoors for persistent access,” wrote Bharat Jogi, the senior director of threat research at Qualys, the security firm that discovered it. β€œIt could facilitate network propagation, allowing attackers to use a compromised system as a foothold to traverse and exploit other vulnerable systems within the organization.”

Read 7 remaining paragraphs | Comments

OpenSSH Remote Code Execution Vulnerability (CVE-2024-6387) Notification

By: NSFOCUS
1 July 2024 at 22:47

Overview Recently, NSFOCUS CERT detected that OpenSSH issued a security announcement and fixed the remote code execution vulnerability of OpenSSH (CVE-2024-6387). Due to a signal handler race condition issue in OpenSSH Server (sshd) under the default configuration, if the client does not authenticate within seconds of LoginGraceTime (120 seconds by default and 600 seconds in […]

The post OpenSSH Remote Code Execution Vulnerability (CVE-2024-6387) Notification appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

The post OpenSSH Remote Code Execution Vulnerability (CVE-2024-6387) Notification appeared first on Security Boulevard.

OpenSSH β€˜regreSSHion’ Vulnerability Exposes Millions of Servers to Remote Attack

By: Alan J
1 July 2024 at 20:41

OpenSSH 'regreSSHion' Vulnerability

Researchers have identified a significant remote code execution (RCE) vulnerability that could affect millions of OpenSSH servers. The vulnerability - dubbed 'regreSSHion' and recorded as CVE-2024-6387 - allows for unauthenticated root-level remote code execution, posing a serious security risk. The vulnerability affects OpenSSH server software running on Linux systems that use the GNU C Library. It stems from a race condition in how OpenSSH handles certain signals during connection attempts.

regreSSHion Vulnerability and Its Impact

Researchers from Qualys discovered that the vulnerability stems from a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems. The vulnerability is remotely exploitable, making it a significant threat to Linux systems. The potential impact of this vulnerability is severe, as it could lead to a complete system takeover, installation of malware, data manipulation, and the creation of backdoors for persistent access. An attacker with root access could bypass critical security mechanisms such as firewalls, intrusion detection systems, and logging mechanisms, making it even more challenging to detect and respond to an attack. The regreSSHion vulnerability impacts a broad range of OpenSSH versions, from the earliest releases up to, but not including, version 9.8p1. However, its effects vary depending upon the version:
  • Versions before 4.4p1 are vulnerable unless patched for earlier, related flaws.
  • Versions 4.4p1 to 8.5p1 are not affected due to previous security fixes.
  • Versions 8.5p1 to 9.8p1 are vulnerable due to an accidental removal of critical code.
However, servers on OpenBSD systems remain unaffected thanks to a secure mechanism implemented in 2001. The researchers stated that they had developed a working exploit for the vulnerability and had disclosed it to theΒ  OpenSSH team to assist in remediation efforts. While the researchers do not release exploits as part of firm policy, they believe that other researchers would be able to replicate results.

Mitigating Risk to OpenSSH Servers

The vulnerability's discovery highlights the importance of ongoing security audits and regression testing in software development. The flaw is a reintroduction of a bug first patched in 2006, demonstrating how even well-maintained projects can inadvertently reopen old security holes. Organizations running vulnerable OpenSSH versions should take immediate action:
  • Apply patches: Update to OpenSSH 9.8p1 or apply vendor-provided fixes for older versions.
  • Limit access: Restrict SSH connections through network controls to reduce attack surface.
  • Segment networks: Isolate critical systems to prevent lateral movement if a breach occurs.
  • Monitor activity: Deploy intrusion detection systems to alert on potential exploitation attempts.
  • Assess exposure: Use asset management tools to identify vulnerable systems across the enterprise
For systems that can't be immediately patched, the researchers recommend setting the LoginGraceTime parameter to 0 in the SSH configuration file as a way to mitigate against remote-code execution. However, the researchers warn that this could instead leave the server vulnerable to denial-of-service attacks.
Before yesterdayMain stream

Millions of OpenSSH Servers Potentially Vulnerable to Remote regreSSHion Attack

1 July 2024 at 07:20

Millions of OpenSSH servers could be vulnerable to unauthenticated remote code execution due to a vulnerability tracked as regreSSHion and CVE-2024-6387.

The post Millions of OpenSSH Servers Potentially Vulnerable to Remote regreSSHion Attack appeared first on SecurityWeek.

❌
❌