AI Score
Confidence
High
EPSS
Percentile
10.7%
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.
[
{
"cpes": [
"cpe:2.3:a:openbsd:openssh:9.5:-:*:*:*:*:*:*"
],
"vendor": "openbsd",
"product": "openssh",
"versions": [
{
"status": "affected",
"version": "9.5",
"versionType": "custom",
"lessThanOrEqual": "9.7"
}
],
"defaultStatus": "unknown"
}
]
www.openwall.com/lists/oss-security/2024/07/03/6
www.openwall.com/lists/oss-security/2024/07/23/4
www.openwall.com/lists/oss-security/2024/07/23/6
www.openwall.com/lists/oss-security/2024/07/28/3
crzphil.github.io/posts/ssh-obfuscation-bypass/
lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html
news.ycombinator.com/item?id=41508530
security.netapp.com/advisory/ntap-20240712-0004/
www.openssh.com/txt/release-9.8
www.openwall.com/lists/oss-security/2024/07/02/1