OpenSSH 爆高危漏洞 CVE-2024-6387
影响版本号 8.5p1 ~ 9.7p1.....
https://security-tracker.debian.org/tracker/CVE-2024-6387
https://ubuntu.com/security/CVE-2024-6387
TL:DR: CVE-2024-6387 is a Remote Unauthenticated Code Execution vulnerability in glibc-based Linux systems. Don't panic, as exploitation has currently only been done in lab environments. Patch sooner rather than later if you're running OpenSSH earlier than 4.4p1 or 8.5p1 up to, but not including, 9.8p1.
What happened? A critical vulnerability in sshd(8) was present in portable OpenSSH versions between 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code execution with root privileges. (source: https://www.openssh.com/releasenotes.html )
What should I do? Check any exposed Linux glibc systems running OpenSSH and patch them if they are vulnerable.
Is this as bad as the internet is making it out to be? At this time? Not really. Everyone loves a good vulnerability, especially heading into a holiday. Per OpenSSH: "Successful exploitation has been demonstrated on 32-bit Linux/glibc systems with ASLR. Under lab conditions, the attack requires on average 6-8 hours of continuous connections up to the maximum the server will accept. Exploitation on 64-bit systems is believed to be possible but has not been demonstrated at this time. It's likely that these attacks will be improved upon.
Exploitation on non-glibc systems is conceivable but has not been examined. Systems that lack ASLR or users of downstream Linux distributions that have modified OpenSSH to disable per-connection ASLR re-randomisation (yes - this is a thing, no - we don't understand why) may potentially have an easier path to exploitation. OpenBSD is not vulnerable." https://www.openssh.com/releasenotes.html
As soon as a public exploit is available, expect vulnerable systems to start getting hit.
Resources:
OpenSSH Advisory: https://www.openssh.com/releasenotes.html
Qualys Research Blog: https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-serve

低调大师中文资讯倾力打造互联网数据资讯、行业资源、电子商务、移动互联网、网络营销平台。
持续更新报道IT业界、互联网、市场资讯、驱动更新,是最及时权威的产业资讯及硬件资讯报道平台。
转载内容版权归作者及来源网站所有,本站原创内容转载请注明来源。
- 上一篇
【2024 插件开发大赛】为 ONLYOFFICE 开发插件,赢取奖金&证书!
ONLYOFFICE 发布了 2024 插件开发大赛:为 ONLYOFFICE 开发适合中国用户的插件,赢取税前5500 – 10000元的结项奖金与证书!阅读本文了解详情。 关于 ONLYOFFICE ONLYOFFICE是一个国际开源项目,由领先的 IT 公司 Ascensio System SIA 开发。在新加坡、拉脱维亚、英国、塞尔维亚、亚美尼亚和乌兹别克斯坦设有分公司,员工和贡献者遍布全球 30 多个国家。中国客户包括:南京大学、知网、百威中国、中信集团等。 ONLYOFFICE 提供文档编辑器:支持编辑处理文本文档、电子表格、演示文稿、表单、PDF和电子书。还提供文件储存及协作平台、文档生成器、转换器等其他工具。 关于插件开发大赛 ONLYOFFICE 目前已有许多广受欢迎插件,例如ChatGPT、Youtube、Mendeley、Jitsi等,但它们大多是国外用户所熟悉的应用。对于中国用户来说,ONLYOFFICE 亟需推出更多适应本地需求与习惯的插件,例如智谱AI。 因此 ONLYOFFICE 邀请大家参与本次大赛,开发适合中国用户的插件,并赢取至高一万元的奖金与证书!...
- 下一篇
B站出现服务故障:视频评论区和用户主页无法加载
更新: 今天上午阿里云服务发生故障。阿里云官方回应称,阿里云在 10:04 监控发现上海地域可用区 N 网络访问出现异常,正在紧急处理中。 10 点 35 分,阿里云工程师完成网络切流调度,上海可用区 N 网络访问开始恢复。 10 点 42 分,阿里云称经过处理受影响产品服务已恢复。 大量网友反馈称,B站(哔哩哔哩)平台今日上午出现服务问题,视频评论区和用户(UP 主)主页都无法加载。 访问B站用户主页会显示 -500 错误码,部分版块甚至直接返回 502,视频评论区则一直显示“加载中”。 此外,用户的观看历史、收藏等内容也无法显示,预计此次错误涉及用户相关系统服务。 截至发稿,上述服务处于时好时坏状态,预计B站官方正在修复中。
相关文章
文章评论
共有0条评论来说两句吧...
文章二维码
点击排行
推荐阅读
最新文章
- Springboot2将连接池hikari替换为druid,体验最强大的数据库连接池
- CentOS8安装MyCat,轻松搞定数据库的读写分离、垂直分库、水平分库
- CentOS8编译安装MySQL8.0.19
- CentOS6,CentOS7官方镜像安装Oracle11G
- CentOS7,8上快速安装Gitea,搭建Git服务器
- SpringBoot2整合Thymeleaf,官方推荐html解决方案
- MySQL8.0.19开启GTID主从同步CentOS8
- SpringBoot2更换Tomcat为Jetty,小型站点的福音
- Red5直播服务器,属于Java语言的直播服务器
- CentOS6,7,8上安装Nginx,支持https2.0的开启