Lucene search

K
nvd[email protected]NVD:CVE-2024-7589
HistoryAug 12, 2024 - 1:38 p.m.

CVE-2024-7589

2024-08-1213:38:44
CWE-364
CWE-362
web.nvd.nist.gov
62
sshd
remote code execution
privilege escalation
race condition
openssh
cve-2024-7589
freebsd

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

73.8%

A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges.

This issue is another instance of the problem in CVE-2024-6387 addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD.

As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root.

Affected configurations

Nvd
Node
freebsdfreebsdRange<13.0
OR
freebsdfreebsdRange13.113.3
OR
freebsdfreebsdMatch13.3p1
OR
freebsdfreebsdMatch13.3p2
OR
freebsdfreebsdMatch13.3p3
OR
freebsdfreebsdMatch13.3p4
OR
freebsdfreebsdMatch14.0beta5
OR
freebsdfreebsdMatch14.0p1
OR
freebsdfreebsdMatch14.0p2
OR
freebsdfreebsdMatch14.0p3
OR
freebsdfreebsdMatch14.0p4
OR
freebsdfreebsdMatch14.0p5
OR
freebsdfreebsdMatch14.0p6
OR
freebsdfreebsdMatch14.0p7
OR
freebsdfreebsdMatch14.0p8
OR
freebsdfreebsdMatch14.0rc3
OR
freebsdfreebsdMatch14.0rc4-p1
OR
freebsdfreebsdMatch14.1p1
OR
freebsdfreebsdMatch14.1p2