Huawei EulerOS: Security Advisory for openssh (EulerOS-SA-2024-2184). Signal handler race condition found in OpenSSH server (sshd) allows unauthenticated client to trigger async-signal-unsafe functions
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
FreeBSD | OpenSSH -- Race condition resulting in potential remote code execution | 1 Jul 202400:00 | – | freebsd |
FreeBSD | OpenSSH -- Pre-authentication async signal safety issue | 6 Aug 202400:00 | – | freebsd |
OpenVAS | QNAP QuTS hero OpenSSH RCE Vulnerability (QSA-24-31, regreSSHion) | 3 Jul 202400:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for openssh (SUSE-SU-2024:2275-1) | 10 Jul 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for openssh (EulerOS-SA-2024-2604) | 28 Oct 202400:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-6859-1) | 2 Jul 202400:00 | – | openvas |
OpenVAS | Mageia: Security Advisory (MGASA-2024-0250) | 4 Jul 202400:00 | – | openvas |
OpenVAS | openSUSE: Security Advisory for openssh (SUSE-SU-2024:2275-2) | 10 Jul 202400:00 | – | openvas |
OpenVAS | Fedora: Security Advisory (FEDORA-2024-dc89a2e1bf) | 10 Sep 202400:00 | – | openvas |
OpenVAS | Fedora: Security Advisory (FEDORA-2024-213f33544e) | 10 Sep 202400:00 | – | openvas |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2024.2184");
script_cve_id("CVE-2024-6387");
script_tag(name:"creation_date", value:"2024-08-20 04:40:56 +0000 (Tue, 20 Aug 2024)");
script_version("2024-08-20T05:05:37+0000");
script_tag(name:"last_modification", value:"2024-08-20 05:05:37 +0000 (Tue, 20 Aug 2024)");
script_tag(name:"cvss_base", value:"7.6");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:N/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2024-07-05 15:10:37 +0000 (Fri, 05 Jul 2024)");
script_name("Huawei EulerOS: Security Advisory for openssh (EulerOS-SA-2024-2184)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2024 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROSVIRT\-2\.11\.0");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2024-2184");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2024-2184");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'openssh' package(s) announced via the EulerOS-SA-2024-2184 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().(CVE-2024-6387)");
script_tag(name:"affected", value:"'openssh' package(s) on Huawei EulerOS Virtualization release 2.11.0.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROSVIRT-2.11.0") {
if(!isnull(res = isrpmvuln(pkg:"openssh", rpm:"openssh~8.8p1~2.h34.eulerosv2r11", rls:"EULEROSVIRT-2.11.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"openssh-clients", rpm:"openssh-clients~8.8p1~2.h34.eulerosv2r11", rls:"EULEROSVIRT-2.11.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"openssh-server", rpm:"openssh-server~8.8p1~2.h34.eulerosv2r11", rls:"EULEROSVIRT-2.11.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo