Security News > 2024 > August > FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability

FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability
2024-08-12 10:15

The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH that attackers could potentially exploit to execute arbitrary code remotely with elevated privileges.

The vulnerability, tracked as CVE-2024-7589, carries a CVSS score of 7.4 out of a maximum of 10.0, indicating high severity.

"The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds. This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges."

OpenSSH is an implementation of the secure shell protocol suite, providing encrypted and authenticated transport for a variety of services, including remote shell access.

"The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD," the project maintainers said.

"As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root."


News URL

https://thehackernews.com/2024/08/freebsd-releases-urgent-patch-for-high.html

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2024-08-12 CVE-2024-7589 Race Condition vulnerability in Freebsd
A signal handler in sshd(8) may call a logging function that is not async-signal-safe.
network
high complexity
freebsd CWE-362
8.1

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Freebsd 4 5 58 97 29 189