Signal Handler Race Condition in OpenSSH's Server

CVE-2024-6387

8.1HIGH

Key Information

Vendor
Red Hat
Status
Red Hat Enterprise Linux 9
Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions
Red Hat Enterprise Linux 9.2 Extended Update Support
Red Hat Enterprise Linux 6
Vendor
CVE Published:
1 July 2024

Badges

🔥 No. 1 Trending😄 Trended👾 Exploit Exists🔴 Public PoC📰 News Worthy

What is CVE-2024-6387?

CVE-2024-6387 is a vulnerability found in OpenSSH's server (sshd), an essential component widely used for secure remote login and other secure network services. This particular flaw arises from a race condition in signal handling, which can lead to unsafe behaviors when receiving signals during user authentication attempts. An unauthenticated remote attacker could exploit this vulnerability by triggering the flaw when a legitimate user fails to authenticate within a specified time frame. Consequently, organizations relying on OpenSSH for secure communications may face severe security risks, including potential unauthorized access and exploitation of their systems.

Technical Details

The vulnerability stems from a security regression related to a previously identified issue (CVE-2006-5051) that affects signal handling in the OpenSSH server. The detected race condition may allow an attacker to execute arbitrary code or perform actions with elevated privileges by manipulating how signals are processed by sshd. This occurs specifically during the authentication phase, which means that the attack can be enacted without valid credentials, broadening the attack surface for malicious actors. The vulnerability affects multiple versions of OpenSSH, necessitating a timely response from users and system administrators to secure their environments.

Impact of the Vulnerability

  1. Unauthorized Remote Code Execution: Exploiting CVE-2024-6387 could allow attackers to execute arbitrary code remotely, potentially gaining control over affected systems without needing authentication.

  2. Data Breach Risk: Organizations may face significant risks of data breaches, as unauthorized access could enable attackers to extract sensitive information, thereby compromising the confidentiality and integrity of data.

  3. Increased Attack Surface: The existence of this vulnerability increases the overall attack surface for OpenSSH servers, particularly for systems that are poorly configured or inadequately monitored, making them attractive targets for cybercriminals.

Affected Version(s)

Red Hat Enterprise Linux 9 <= 0:8.7p1-38.el9_4.1

Red Hat Enterprise Linux 9 <= 0:8.7p1-38.el9_4.1

Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions <= 0:8.7p1-12.el9_0.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVE-2024-6387 aka regreSSHion – root cause, risks, mitigation

Which systems are vulnerable to the OpenSSH CVE-2024-6387 flaw, and how can its exploitation be prevented?

4 weeks ago

FreeBSD releases new patch for regreSSHion-related RCE flaw

The OpenSSH vulnerability in the operating system could enable remote code execution with root privileges.

2 months ago

FreeBSD releases new patch for regreSSHion-related RCE flaw

The OpenSSH vulnerability in the operating system could enable remote code execution with root privileges.

4 months ago

Refferences

http://www.openwall.com/lists/oss-security/2024/07/01/12
http://www.openwall.com/lists/oss-security/2024/07/01/13
http://www.openwall.com/lists/oss-security/2024/07/02/1
http://www.openwall.com/lists/oss-security/2024/07/03/1
http://www.openwall.com/lists/oss-security/2024/07/03/11
http://www.openwall.com/lists/oss-security/2024/07/03/2
http://www.openwall.com/lists/oss-security/2024/07/03/3
http://www.openwall.com/lists/oss-security/2024/07/03/4
http://www.openwall.com/lists/oss-security/2024/07/03/5
http://www.openwall.com/lists/oss-security/2024/07/04/1
http://www.openwall.com/lists/oss-security/2024/07/04/2
http://www.openwall.com/lists/oss-security/2024/07/08/2
http://www.openwall.com/lists/oss-security/2024/07/08/3
https://access.redhat.com/errata/RHSA-2024:4312
vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:4340
vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:4389
vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-6387
vdb-entryx_refsource_REDHAT
https://archlinux.org/news/the-sshd-service-needs-to-be-r...
https://arstechnica.com/security/2024/07/regresshion-vuln...
https://blog.qualys.com/vulnerabilities-threat-research/2...
https://bugzilla.redhat.com/show_bug.cgi?id=2294604
issue-trackingx_refsource_REDHAT
https://explore.alas.aws.amazon.com/CVE-2024-6387.html
https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132
https://ftp.netbsd.org/pub/NetBSD/security/advisories/Net...
https://github.com/AlmaLinux/updates/issues/629
https://github.com/Azure/AKS/issues/4379
https://github.com/PowerShell/Win32-OpenSSH/discussions/2248
https://github.com/PowerShell/Win32-OpenSSH/issues/2249
https://github.com/microsoft/azurelinux/issues/9555
https://github.com/oracle/oracle-linux/issues/149
https://github.com/rapier1/hpn-ssh/issues/87
https://github.com/zgzhang/cve-2024-6387-poc
https://lists.mindrot.org/pipermail/openssh-unix-announce...
https://lists.mindrot.org/pipermail/openssh-unix-dev/2024...
https://news.ycombinator.com/item?id=40843778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-202...
https://security-tracker.debian.org/tracker/CVE-2024-6387
https://security.netapp.com/advisory/ntap-20240701-0001/
https://sig-security.rocky.page/issues/CVE-2024-6387/
https://stackdiary.com/openssh-race-condition-in-sshd-all...
https://ubuntu.com/security/CVE-2024-6387
https://ubuntu.com/security/notices/USN-6859-1
https://www.freebsd.org/security/advisories/FreeBSD-SA-24...
https://www.openssh.com/txt/release-9.8
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshi...
https://www.splunk.com/en_us/blog/security/cve-2024-6387-...
https://www.suse.com/security/cve/CVE-2024-6387.html
https://www.theregister.com/2024/07/01/regresshion_openssh/
https://www.akamai.com/blog/security-research/2024-openss...
https://lists.almalinux.org/archives/list/announce@lists....

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🔴

    Public PoC available

  • 🔥

    Vulnerability reached the number 1 worldwide trending spot

  • Vulnerability started trending

  • 👾

    Exploit known to exist

  • First article discovered by SecurityWeek

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseRed Hat Feed7 Proof of Concept(s)24 News Article(s)
.