CVE-2024-6387

Summary

A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

Severity
HIGH
Severity Score

-

Vector

-

CWE-ID

CWE-364

Vulnerability ID
CVE-2024-6387
Severity
HIGH
Severity Score
-
Summary
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
References
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2070497 https://bugzilla.mindrot.org/show_bug.cgi?id=3690 https://ubuntu.com/security/notices/USN-6859-1 https://www.cve.org/CVERecord?id=CVE-2024-6387 https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
Mitigation and Patches
Exploits
https://github.com/acrono/cve-2024-6387-poc https://github.com/acrono/cve-2024-6387-poc
Metasploit Payload
Vector
-
CWE ID
CWE-364

See SecOps Solution
in action

Schedule Demo