Skip to main content Skip to local navigation

Openssh Remote Code Execution (RegreSSHion) (CVE-2024-6387)

Openssh Remote Code Execution (RegreSSHion) (CVE-2024-6387)

 

A picture containing text  Description automatically generated

 

Service Advisory

A new Unauthenticated Remote code Execution (RCE) vulnerability (CVE-2024-6387) has been disclosed in OpenSSH's servers which gives root privileges on glibc-based Linux system.

 

CVSS Score:
8.1/High

 

Description:- 
OpenSSH is a suite of networking utilities based on the Secure Shell (SSH) protocol. It is extensively used for secure remote login, remote server management and administration, and file transfers via SCP and SFTP. OpenSSH server process 'sshd' is affected by a signal handler race condition allowing unauthenticated remote code execution with root privileges on glibc-based Linux systems.

 

Affected Versions :-   

Versions between 8.5p1 and 9.7p1.

Versions prior 4.4p1 are also vulnerable.

                                       

Impact:-

This Vulnerability if exploited could lead to complete system takeover.

 

Resolution:-

Apply the latest available update for the OpenSSH server.

Reference:-

https://www.qualys.com/regresshion-cve-2024-6387/

https://ubuntu.com/security/CVE-2024-6387

https://www.bleepingcomputer.com/news/security/new-regresshion-openssh-rce-bug-gives-root-on-linux-servers/

https://www.cve.org/CVERecord?id=CVE-2024-6387

 

UIT Information Security

 

 

Contact

Client Services at askit@yorku.ca or 416 736 5800

 

PRIVACY POLICY | VISIT WWW.YORKU.CA
This email was sent by: York University, 4700 Keele Street, Toronto, Ontario M3J 1P3

This email is viewed best in Microsoft Outlook for web