{"uuid": "a23277b0-65d9-4c29-aa3b-7f43822f8234", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-6387", "type": "published-proof-of-concept", "source": "https://t.me/cybersecs/2895", "content": "[ regreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH server ]\n\nCVE-2024-6387\n\nAffected OpenSSH versions:\n\u2014 OpenSSH versions earlier than 4.4p1 are vulnerable to this signal handler race condition unless they are patched for CVE-2006-5051 and CVE-2008-4109.\n\u2014 Versions from 4.4p1 up to, but not including, 8.5p1 are not vulnerable due to a transformative patch for CVE-2006-5051, which made a previously unsafe function secure.\n\u2014 The vulnerability resurfaces in versions from 8.5p1 up to, but not including, 9.8p1 due to the accidental removal of a critical component in a function.\n\u2014 OpenBSD systems are unaffected by this bug, as OpenBSD developed a secure mechanism in 2001 that prevents this vulnerability.\n\nBlog by Qualys:\nhttps://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server\n\nCheck FAQ for any other questions and...\nUpdate ASAP (+ fail2ban)\n\nPOC: \u041d\u0410 \u0421\u0412\u041e\u0419 \u0421\u0422\u0420\u0410\u0425 \u0418 \u0420\u0418\u0421\u041a", "creation_timestamp": "2024-07-02T14:11:09.000000Z"}