
OpenSSH “regreSSHion” RCE with root privileges (CVE-2024-6387). The vulnerability was discovered by Qualys. An unauthenticated remote attacker can execute arbitrary code as root. It sounds creepy.
This vulnerability is a regression of the CVE-2006-5051. For it, by the way, there are no signs of exploitation in the wild or exploits.
The regression happened in October 2020, starting with OpenSSH version 8.5p1
“glibc-based Linux systems” in default configuration are vulnerable, OpenBSD is not vulnerable
There are 14 million potentially vulnerable hosts on the Internet
Qualys promise not to publish the exploit, but third-party researchers can write it based on the detailed write-up
Vulnerable versions:
OpenSSH < 4.4p1
8.5p1 <= OpenSSH < 9.8p1
Invulnerable versions:
4.4p1 <= OpenSSH < 8.5p1
OpenSSH >= 9.8p1
Upd. Attacking a 32-bit system with ASLR in laboratory conditions took 6-8 hours. Apparently the process is not so easy.