Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    Wednesday, February 11
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
    NotesleuNotesleu
    Home»Cybersecurity»Remote Command Injection Risk via New OpenSSH Flaw: Linux Systems Warned
    Cybersecurity

    Remote Command Injection Risk via New OpenSSH Flaw: Linux Systems Warned

    By securnerd2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Follow Us
    Google News

    A now-resolved vulnerability in OpenSSH was discovered that could potentially be exploited to execute arbitrary commands remotely on vulnerable hosts under specific circumstances, details of which have surfaced recently.

    “The detected vulnerability could possibly enable a remote attacker to execute arbitrary commands on OpenSSH’s vulnerable forwarded ssh-agent,” Saeed Abbasi, the manager of vulnerability research at Qualys, stated in an analysis last week.

    Identified as CVE-2023-38408, the vulnerability impacts all versions of OpenSSH preceding 9.3p2. As of now, there is no CVSS score attached to this vulnerability.

    OpenSSH, a widely-used tool for remote login employing the SSH protocol, encrypts all traffic to prevent eavesdropping, connection hijacking, and other forms of cyberattacks.

    The successful exploitation of this vulnerability hinges on the presence of specific libraries on the compromised system and the forwarding of the SSH authentication agent to an attacker-controlled system. The SSH agent, a background program, stores user keys in memory and simplifies remote server logins by eliminating the need to re-enter passphrases.

    Qualys explained that upon examining the source code of the ssh-agent, they noticed that a remote attacker with access to the remote server (where the victim’s ssh-agent has been forwarded) can load and immediately unload any shared library in /usr/lib* on the victim’s workstation, via the forwarded ssh-agent. This is possible if the ssh-agent is compiled with ENABLE_PKCS11, which is the default setting.

    A successful proof-of-concept (PoC) against default installations of Ubuntu Desktop 22.04 and 21.10 was executed by the cybersecurity firm. It is anticipated that other Linux distributions could also be vulnerable.

    OpenSSH users are urged to promptly update to the latest version as a protective measure against potential cybersecurity threats.

    This revelation follows a sequence of updates released by OpenSSH maintainers this year to address vulnerabilities. In February, an update was issued to fix a medium-severity security flaw (CVE-2023-25136, CVSS score: 6.5) that could be potentially manipulated by an unauthenticated remote attacker to modify unexpected memory locations and possibly achieve code execution. Another update in March remediated a separate security problem that could be leveraged via a uniquely crafted DNS response to perform an out-of-bounds read of adjacent stack data, leading to a denial-of-service to the SSH client.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 65

    Related Posts

    • Python Mastery: From Beginner to Expert Part-2(Object-Oriented Programming)
    • Independent Lab Validates Nubeva’s Innovative Ransomware Key Interception and Decryption Technology
    • Where’s all the money gone? Even AI startups struggling to find investors
    • North Korea’s Lazarus Group Utilizes Cross-Chain Cryptocurrency Laundering Techniques to Illicitly Gain $900 Million
    Follow on Google News
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Microsoft Enhances Windows 11 Security with Kerberos Authentication Over NTLM Protocol

    October 15, 202318 Views

    New Nitrogen malware pushed via Google Ads for ransomware attacks

    July 27, 2023222 Views

    Hacking Group Cult of the Dead Cow Develops Veilid, an End-to-End Encryption System for Social Media and Messaging Apps

    August 3, 202356 Views
    • Contact Us
    • About US
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.