Cyber Security

OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability

OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability
Written by admin


Feb 06, 2023Ravie LakshmananAuthentication / Vulnerability

OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability

The maintainers of OpenSSH have launched OpenSSH 9.2 to deal with a lot of safety bugs, together with a reminiscence security vulnerability within the OpenSSH server (sshd).

Tracked as CVE-2023-25136, the shortcoming has been labeled as a pre-authentication double free vulnerability that was launched in model 9.1.

“This isn’t believed to be exploitable, and it happens within the unprivileged pre-auth course of that’s topic to chroot(2) and is additional sandboxed on most main platforms,” OpenSSH disclosed in its launch notes on February 2, 2023.

Credited with reporting the flaw to OpenSSH in July 2022 is safety researcher Mantas Mikulenas.

OpenSSH is the open supply implementation of the safe shell (SSH) protocol that provides a set of providers for encrypted communications over an unsecured community in a client-server structure.

“The publicity happens within the chunk of reminiscence freed twice, the ‘choices.kex_algorithms,'” Saeed Abbasi, supervisor of vulnerability analysis at Qualys, stated, including the difficulty leads to a “double free within the unprivileged sshd course of.”

Double free flaws come up when a susceptible piece of code calls the free() operate – which is used to deallocate reminiscence blocks – twice, resulting in reminiscence corruption, which, in flip, might result in a crash or execution of arbitrary code.

“Doubly liberating reminiscence could lead to a write-what-where situation, permitting an attacker to execute arbitrary code,” MITRE notes in its description of the flaw.

“Whereas the double-free vulnerability in OpenSSH model 9.1 could increase issues, it’s important to notice that exploiting this concern isn’t any easy process,” Abbasi defined.

“That is because of the protecting measures put in place by fashionable reminiscence allocators and the sturdy privilege separation and sandboxing applied within the impacted sshd course of.”

Customers are really useful to replace to OpenSSH 9.2 to mitigate potential safety threats.

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.



About the author

admin

Leave a Comment