OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
21 Nov 2024, 07:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2023/02/13/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/02/22/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/02/22/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/02/23/3 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/03/06/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/03/09/2 - Mailing List, Third Party Advisory | |
References | () https://bugzilla.mindrot.org/show_bug.cgi?id=3522 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig - Patch, Vendor Advisory | |
References | () https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946 - Patch, Third Party Advisory | |
References | () https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/ - Exploit, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGAUIXJ3TEKCRKVWFQ6GDAGQFTIIGQQP/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/ - | |
References | () https://news.ycombinator.com/item?id=34711565 - Issue Tracking, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202307-01 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20230309-0003/ - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2023/02/02/2 - Exploit, Mailing List, Third Party Advisory |
27 Feb 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
First Time |
Openbsd
Openbsd openssh |
|
CPE | cpe:2.3:a:openbsd:openssh:9.1:*:*:*:*:*:*:* |
Information
Published : 2023-02-03 06:15
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25136
Mitre link : CVE-2023-25136
CVE.ORG link : CVE-2023-25136
JSON object : View
Products Affected
netapp
- a250_firmware
- ontap_select_deploy_administration_utility
- 500f_firmware
- c250_firmware
- c250
- a250
- 500f
fedoraproject
- fedora
openbsd
- openssh
CWE
CWE-415
Double Free