#VU71771 Double Free in OpenSSH - CVE-2023-25136

 

#VU71771 Double Free in OpenSSH - CVE-2023-25136

Published: February 2, 2023 / Updated: July 26, 2024


Vulnerability identifier: #VU71771
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2023-25136
CWE-ID: CWE-415
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
OpenSSH
Software vendor:
OpenSSH

Description

The vulnerability allows a remote attacker to potentially execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the sshd(8) daemon. A remote non-authenticated attacker can send  specially crafted data to the application, trigger a double free error and execute arbitrary code on the target system.

The vendor believes exploitation of this vulnerability has limitations as double free occurs "in the unprivileged pre-auth process that is subject to chroot(2) and is further sandboxed on most major platforms". Nevertheless we assign a high risk to this vulnerability.


Remediation

Install updates from vendor's website.

External links