7
CVE-2024-6409
- EPSS 78.16%
- Published 08.07.2024 18:15:09
- Last modified 21.11.2024 09:49:35
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://www.openssh.com/
≫
Package
OpenSSH
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:8.7p1-38.el9_4.4
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:8.7p1-38.el9_4.4
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
Default Statusaffected
Version <
*
Version
0:8.7p1-12.el9_0.3
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9.2 Extended Update Support
Default Statusaffected
Version <
*
Version
0:8.7p1-30.el9_2.7
Status
unaffected
VendorRed Hat
≫
Product
Red Hat OpenShift Container Platform 4.13
Default Statusaffected
Version <
*
Version
413.92.202408122222-0
Status
unaffected
VendorRed Hat
≫
Product
Red Hat OpenShift Container Platform 4.14
Default Statusaffected
Version <
*
Version
414.92.202407300859-0
Status
unaffected
VendorRed Hat
≫
Product
Red Hat OpenShift Container Platform 4.15
Default Statusaffected
Version <
*
Version
415.92.202407301159-0
Status
unaffected
VendorRed Hat
≫
Product
Red Hat OpenShift Container Platform 4.16
Default Statusaffected
Version <
*
Version
416.94.202407171205-0
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 10
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 6
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 7
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 8
Default Statusunaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 78.16% | 0.99 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 7 | 2.2 | 4.7 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
|
CWE-364 Signal Handler Race Condition
The product uses a signal handler that introduces a race condition.