Skip to content

OpenSSH Critical Advisory - 20240702001

Overview

OpenSSH has released fixes for a critical vulnerability present in Portable OpenSSH sshd(8), that may allow arbitrary code execution with root privileges.

A signal handler race condition found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

What is vulnerable?

Products Affected CVE CVSS Severity
Portable OpenSSH versions between 8.5p1 and 9.7p1 (inclusive) CVE-2024-6387 8.1 High

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):

Additional References