Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

RegreSSHion: Remote Code Execution Vulnerability In OpenSSH Server

Written by Michael Larabel in Linux Security on 1 July 2024 at 08:25 AM EDT. 102 Comments
LINUX SECURITY
Qualys went public today with a security vulnerability they have discovered within the OpenSSH server that could lead to remote, unauthenticated code execution.

OpenSSH servers running with the GNU C Library (glibc) in Linux environments are vulnerable to CVE-2024-6387, or the vulnerability they have dubbed "RegreSSHion" as a play on "SSH" and "regression".

A signal handler race condition within the OpenSSH server could lead to unauthenticated remote code execution. Various versions of OpenSSH going back years are affected on Linux.

Qualys regreSSHion logo


Qualys noted in their research:
"This vulnerability, if exploited, could lead to full system compromise where an attacker can execute arbitrary code with the highest privileges, resulting in a complete system takeover, installation of malware, data manipulation, and the creation of backdoors for persistent access. It could facilitate network propagation, allowing attackers to use a compromised system as a foothold to traverse and exploit other vulnerable systems within the organization."

More details on CVE-2024-6387 as this severe OpenSSH security vulnerability for Linux servers can be found via the Qualys blog.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week