Close Menu
    Facebook X (Twitter) Instagram
    Saturday, November 15
    Facebook X (Twitter) Instagram
    SecurNerd
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Cybersecurity»Remote Command Injection Risk via New OpenSSH Flaw: Linux Systems Warned
    Cybersecurity

    Remote Command Injection Risk via New OpenSSH Flaw: Linux Systems Warned

    securnerdBy securnerdJuly 24, 2023No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A now-resolved vulnerability in OpenSSH was discovered that could potentially be exploited to execute arbitrary commands remotely on vulnerable hosts under specific circumstances, details of which have surfaced recently.

    “The detected vulnerability could possibly enable a remote attacker to execute arbitrary commands on OpenSSH’s vulnerable forwarded ssh-agent,” Saeed Abbasi, the manager of vulnerability research at Qualys, stated in an analysis last week.

    Identified as CVE-2023-38408, the vulnerability impacts all versions of OpenSSH preceding 9.3p2. As of now, there is no CVSS score attached to this vulnerability.

    OpenSSH, a widely-used tool for remote login employing the SSH protocol, encrypts all traffic to prevent eavesdropping, connection hijacking, and other forms of cyberattacks.

    The successful exploitation of this vulnerability hinges on the presence of specific libraries on the compromised system and the forwarding of the SSH authentication agent to an attacker-controlled system. The SSH agent, a background program, stores user keys in memory and simplifies remote server logins by eliminating the need to re-enter passphrases.

    Qualys explained that upon examining the source code of the ssh-agent, they noticed that a remote attacker with access to the remote server (where the victim’s ssh-agent has been forwarded) can load and immediately unload any shared library in /usr/lib* on the victim’s workstation, via the forwarded ssh-agent. This is possible if the ssh-agent is compiled with ENABLE_PKCS11, which is the default setting.

    A successful proof-of-concept (PoC) against default installations of Ubuntu Desktop 22.04 and 21.10 was executed by the cybersecurity firm. It is anticipated that other Linux distributions could also be vulnerable.

    OpenSSH users are urged to promptly update to the latest version as a protective measure against potential cybersecurity threats.

    This revelation follows a sequence of updates released by OpenSSH maintainers this year to address vulnerabilities. In February, an update was issued to fix a medium-severity security flaw (CVE-2023-25136, CVSS score: 6.5) that could be potentially manipulated by an unauthenticated remote attacker to modify unexpected memory locations and possibly achieve code execution. Another update in March remediated a separate security problem that could be leveraged via a uniquely crafted DNS response to perform an out-of-bounds read of adjacent stack data, leading to a denial-of-service to the SSH client.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 56
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Next Article Debian Project Launches Debian 12.1 “Bookworm” Featuring 89 Bug Remediations and 26 Security Enhancements
    securnerd
    • Website
    • Facebook
    • X (Twitter)
    • Instagram

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Related Posts

    Cybersecurity January 22, 2024

    FTC Enforces Strict Measures Against InMarket for Unauthorized Sale of Precise User Location Data

    January 22, 2024
    Cyber Crime November 29, 2023

    How Hackers Phish for Your Users’ Credentials and Sell Them

    November 29, 2023
    AI October 28, 2023

    Google Expands Its Bug Bounty Program to Tackle Artificial Intelligence Threats

    October 28, 2023
    Add A Comment
    Leave A Reply Cancel Reply

    Join the Community
    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    A Mild, Sweet Fruit With a Fibrous Center

    September 6, 20230 Views

    For Good Results Must Be Make Good Plan

    September 6, 20230 Views

    Mistakes You Might Be Making With Your Watch

    September 6, 20231 Views

    Top Men’s Fashion Trends From Spring

    September 6, 20230 Views

    Surprising Benefits of Honeydew Melon

    September 6, 20230 Views

    Spicy Crispy Chicken Burger Recipe

    September 6, 20230 Views

    Apple’s Recent Vulnerabilities Exploited to Attack Ex-Egyptian MP using “Predator” Malware

    September 23, 202336 Views

    Ethos Technologies Data Breach Settlement Offers Compensation of Up to $5,200 for Affected Individuals

    September 23, 20236 Views

    Microsoft’s Ongoing Struggles with Cybersecurity: A $2.4 Trillion Giant’s Failures

    September 23, 20234 Views

    New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks

    September 24, 20234 Views
    Facebook X (Twitter) Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.