Lucene search

K
cve[email protected]CVE-2023-25136
HistoryFeb 03, 2023 - 6:15 a.m.

CVE-2023-25136

2023-02-0306:15:09
CWE-415
web.nvd.nist.gov
499
4
openssh
openssh server
sshd
double-free vulnerability
kex_algorithms
remote code execution
cve-2023-25136
nvd

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

6.8 Medium

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

82.6%

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states “remote code execution is theoretically possible.”

Affected configurations

NVD
Node
openbsdopensshMatch9.1
Node
fedoraprojectfedoraMatch37
OR
fedoraprojectfedoraMatch38
Node
netappontap_select_deploy_administration_utilityMatch-
Node
netappa250_firmwareMatch-
AND
netappa250Match-
Node
netapp500f_firmwareMatch-
AND
netapp500fMatch-
Node
netappc250_firmwareMatch-
AND
netappc250Match-
CPENameOperatorVersion
openbsd:opensshopenbsd openssheq9.1

References

Social References

More

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

6.8 Medium

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

82.6%