Monday, February 6, 2023
HomeCyber SecurityOpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability

OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability


Feb 06, 2023Ravie LakshmananAuthentication / Vulnerability

The maintainers of OpenSSH have launched OpenSSH 9.2 to handle numerous safety bugs, together with a reminiscence security vulnerability within the OpenSSH server (sshd).

Tracked as CVE-2023-25136, the shortcoming has been categorised as a pre-authentication double free vulnerability that was launched in model 9.1.

“This isn’t believed to be exploitable, and it happens within the unprivileged pre-auth course of that’s topic to chroot(2) and is additional sandboxed on most main platforms,” OpenSSH disclosed in its launch notes on February 2, 2023.

Credited with reporting the flaw to OpenSSH in July 2022 is safety researcher Mantas Mikulenas.

OpenSSH is the open supply implementation of the safe shell (SSH) protocol that gives a collection of providers for encrypted communications over an unsecured community in a client-server structure.

“The publicity happens within the chunk of reminiscence freed twice, the ‘choices.kex_algorithms,'” Qualys researcher Saeed Abbasi mentioned, including the problem ends in a “double free within the unprivileged sshd course of.”

Double free flaws come up when a weak piece of code calls the free() operate – which is used to deallocate reminiscence blocks – twice, resulting in reminiscence corruption, which, in flip, might result in a crash or execution of arbitrary code.

“Doubly liberating reminiscence might lead to a write-what-where situation, permitting an attacker to execute arbitrary code,” MITRE notes in its description of the flaw.

“Whereas the double-free vulnerability in OpenSSH model 9.1 might elevate considerations, it’s important to notice that exploiting this problem is not any easy job,” Abbasi defined.

“That is because of the protecting measures put in place by trendy reminiscence allocators and the strong privilege separation and sandboxing carried out within the impacted sshd course of.”

Customers are really helpful to replace to OpenSSH 9.2 to mitigate potential safety threats.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments