Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

RegreSSHion

From Wikipedia, the free encyclopedia
Security bug within OpenSSH, 2024
RegreSSHion (security bug)
CVE identifier(s)CVE-2024-6387
Date patched1 July 2024; 8 months ago (2024-07-01)
DiscovererQualys Threat Research Unit (TRU)
Affected softwareOpenSSH (8.5p1–9.7p1)

RegreSSHion is a family ofsecurity bugs in theOpenSSH software that allows for an attacker toremotely execute code and gain potentialroot access on a machine running theOpenSSH Server.[1][2] The vulnerability was discovered by theQualys Threat Research Unit and was disclosed on July 1, 2024. It affected all prior versions of OpenSSH from 8.5p1 (March 3, 2021) to 9.7p1 (March 11, 2024) and was patched in release 9.8/9.8p1 on July 1, 2024.[3] Qualys reported identifying over 14 million public facing OpenSSH instances potentially vulnerable to the attack.[4] It affectsglibc-basedLinux systems;Windows andOpenBSD systems are not vulnerable to the attack.

Disclosure

[edit]

The vulnerability was publicly disclosed byQualys on July 1, 2024. Qualys reported disclosing the vulnerability to the OpenSSH developers on May 19, approximately two months prior, and reported notifyingOpenWall on June 20, 2024.[5]

Vulnerability

[edit]
The regression vulnerability.
Diagram of regreSSHion vulnerability

The regreSSHion vulnerability in OpenSSH results from asignal handlerrace condition in its server component (sshd). This issue is triggered when aclient fails toauthenticate within the LoginGraceTime period (default 120 seconds). When this timeout occurs, sshd'sSIGALRM handler is calledasynchronously, invoking functions that are not safe to use in signal handlers, such as syslog(). In versions < 4.4p1, an attacker could exploit thefree() function duringsyslog() within the signal handler. However, in versions from 8.5p1 to 9.7p1, both thefree() andmalloc() functions are targeted.

This vulnerability is aregression of CVE-2006-5051, reintroduced in OpenSSH 8.5p1 (October 2020) due to the accidental removal of a crucial directive that had mitigated the earlier vulnerability. The directive transformed unsafe calls into a safe _exit(1) call.[5]

Affected versions

[edit]

Note: The following versions are referring to the upstream versions. Checking the versions shipped by e.g. linux Distros is not enough to validate it being vulnerable or not as many have backported fixes to older versions. E.g. Debian's OpensSSH version 9.7p1-7[6]and Rocky Linux's OpenSSH version 8.7p1-38.4[7]are also NOT Vulnerable.

Legend:VulnerableNot Vulnerable
ReleaseStatusDate
< 4.4p1Vulnerable if not patched against CVE-2006-5051 or CVE-2008-4109Before Sep. 27th, 2006
4.4p1 ≤ OpenSSH < 8.5p1Not vulnerable due to presence of mitigation directiveSep. 27th, 2006 - Mar. 3rd, 2021
8.5p1 ≤ OpenSSH < 9.8p1Vulnerable again because the directive was removedMar. 3rd, 2021 - Jul. 1st, 2024
≥ 9.8p1Patched officiallyAfter Jul. 1st, 2024

[5]

Terminology

[edit]

According to Qualys, the bug was named "regreSSHion" as a reference to aregression bug affectingOpenSSH.[3][4]

References

[edit]
  1. ^"RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server". July 2024.
  2. ^""RegreSSHion" vulnerability in OpenSSH gives attackers root on Linux". 2 July 2024.
  3. ^ab"OpenSSH Release Notes".OpenSSH. Retrieved16 July 2024.
  4. ^ab"regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server".Qualys Community. Qualys. Retrieved16 July 2024.
  5. ^abc"Qualys Technical Details".Qualys. Retrieved16 July 2024.
  6. ^"Package: openssh | Debian Sources".sources.debian.org. Retrieved2024-07-26.
  7. ^"import openssh-8.7p1-38.el9_4.4 (ebf2263f) · Commits · staging / rpms / openssh · GitLab".GitLab. 2024-07-10. Retrieved2024-07-26.
Retrieved from "https://en.wikipedia.org/w/index.php?title=RegreSSHion&oldid=1239362771"
Category:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp