Lucene search

K
nvd[email protected]NVD:CVE-2024-6387
HistoryJul 01, 2024 - 1:15 p.m.

CVE-2024-6387

2024-07-0113:15:06
CWE-364
CWE-362
web.nvd.nist.gov
111
openssh
security regression
remote attacker
race condition
authentication

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.929

Percentile

99.1%

A security regression (CVE-2006-5051) was discovered in OpenSSH’s server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

Affected configurations

Nvd
Node
openbsdopensshRange<4.4
OR
openbsdopensshRange8.69.8
OR
openbsdopensshMatch4.4-
OR
openbsdopensshMatch8.5p1
Node
redhatopenshift_container_platformMatch4.0
OR
redhatenterprise_linuxMatch9.0
OR
redhatenterprise_linux_eusMatch9.4
OR
redhatenterprise_linux_for_arm_64Match9.0_aarch64
OR
redhatenterprise_linux_for_arm_64_eusMatch9.4_aarch64
OR
redhatenterprise_linux_for_ibm_z_systemsMatch9.0_s390x
OR
redhatenterprise_linux_for_ibm_z_systems_eusMatch9.4_s390x
OR
redhatenterprise_linux_for_power_little_endianMatch9.0_ppc64le
OR
redhatenterprise_linux_for_power_little_endian_eusMatch9.4_ppc64le
OR
redhatenterprise_linux_server_ausMatch9.4
Node
suselinux_enterprise_microMatch6.0
Node
debiandebian_linuxMatch12.0
Node
canonicalubuntu_linuxMatch22.04lts
OR
canonicalubuntu_linuxMatch22.10-
OR
canonicalubuntu_linuxMatch23.04lts
Node
amazonlinux_2023Match-
Node
netappe-series_santricity_os_controllerRange11.0.011.70.2
OR
netappontap_select_deploy_administration_utilityMatch-
OR
netappontap_toolsMatch9vmware_vsphere
Node
freebsdfreebsdMatch13.2-
OR
freebsdfreebsdMatch13.2p1
OR
freebsdfreebsdMatch13.2p10
OR
freebsdfreebsdMatch13.2p11
OR
freebsdfreebsdMatch13.2p2
OR
freebsdfreebsdMatch13.2p3
OR
freebsdfreebsdMatch13.2p4
OR
freebsdfreebsdMatch13.2p5
OR
freebsdfreebsdMatch13.2p6
OR
freebsdfreebsdMatch13.2p7
OR
freebsdfreebsdMatch13.2p8
OR
freebsdfreebsdMatch13.2p9
OR
freebsdfreebsdMatch13.3-
OR
freebsdfreebsdMatch13.3p1
OR
freebsdfreebsdMatch13.3p2
OR
freebsdfreebsdMatch13.3p3
OR
freebsdfreebsdMatch14.0-
OR
freebsdfreebsdMatch14.0beta5
OR
freebsdfreebsdMatch14.0p1
OR
freebsdfreebsdMatch14.0p2
OR
freebsdfreebsdMatch14.0p3
OR
freebsdfreebsdMatch14.0p4
OR
freebsdfreebsdMatch14.0p5
OR
freebsdfreebsdMatch14.0p6
OR
freebsdfreebsdMatch14.0p7
OR
freebsdfreebsdMatch14.0rc3
OR
freebsdfreebsdMatch14.0rc4-p1
OR
freebsdfreebsdMatch14.1-
OR
freebsdfreebsdMatch14.1p1
Node
netbsdnetbsdRange10.0.0
VendorProductVersionCPE
openbsdopenssh*cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
openbsdopenssh4.4cpe:2.3:a:openbsd:openssh:4.4:-:*:*:*:*:*:*
openbsdopenssh8.5cpe:2.3:a:openbsd:openssh:8.5:p1:*:*:*:*:*:*
redhatopenshift_container_platform4.0cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
redhatenterprise_linux9.0cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
redhatenterprise_linux_eus9.4cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
redhatenterprise_linux_for_arm_649.0_aarch64cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
redhatenterprise_linux_for_arm_64_eus9.4_aarch64cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*
redhatenterprise_linux_for_ibm_z_systems9.0_s390xcpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
redhatenterprise_linux_for_ibm_z_systems_eus9.4_s390xcpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
Rows per page:
1-10 of 521