SB2025010874 - Junos OS and Junos OS Evolved update for OpenSSH
Published: January 8, 2025 Updated: February 28, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Race condition (CVE-ID: CVE-2024-6387)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a race condition in portable version of sshd. A remote non-authenticated attacker can send a series of requests in order to trigger a race condition and execute arbitrary code on the system.
2) Race condition (CVE-ID: CVE-2006-5051)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a race condition in sshd when GSSAPI authentication is enabled. A remote attacker can send specially crafted requests to the daemon, trigger a race condition and execute arbitrary code on the system.
3) Information disclosure (CVE-ID: CVE-2024-39894)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due a logic error in ObscureKeystrokeTiming implementation within the ssh client. A local user with ability to passively observe SSH sessions can recover sensitive input, such as password for the su or sudo programs.
Remediation
Install update from vendor's website.