Security News > 2024 > August > FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability
The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH that attackers could potentially exploit to execute arbitrary code remotely with elevated privileges.
The vulnerability, tracked as CVE-2024-7589, carries a CVSS score of 7.4 out of a maximum of 10.0, indicating high severity.
"The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds. This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges."
OpenSSH is an implementation of the secure shell protocol suite, providing encrypted and authenticated transport for a variety of services, including remote shell access.
"The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD," the project maintainers said.
"As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root."
News URL
https://thehackernews.com/2024/08/freebsd-releases-urgent-patch-for-high.html
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-08-12 | CVE-2024-7589 | Race Condition vulnerability in Freebsd A signal handler in sshd(8) may call a logging function that is not async-signal-safe. | 8.1 |