The vulnerability named "RegreSSHion", tracked as CVE-2024-6387, is a severe and critical flaw identified in OpenSSH servers (sshd) on glibc-based Linux systems. It specifically originates from a signal handler race condition during SSH authentication, leading to unsafe handling of the SIGALRM signal. This vulnerability can result in unauthenticated remote code execution (RCE) with root privileges, posing a significant threat to enterprises heavily reliant on OpenSSH for remote server management. The bug was discovered by researchers at the Qualys Threat Research Unit (TRU), who assigned it an 8.1 CVSS score, indicating its high severity.
Interestingly, the RegreSSHion vulnerability is a reappearance of a flaw that was previously fixed in 2006 (CVE-2006-5051). This recurrence suggests that the flaw was likely reintroduced through untested updates or the use of older code, underscoring the need for rigorous regression testing in software development processes. The discovery of this vulnerability has resulted in advisories from various security organizations including Palo Alto Networks and Ubuntu, emphasizing the widespread usage of OpenSSH and the potential impact of the vulnerability.
In response to the discovery of the RegreSSHion vulnerability, it is recommended that all cloud resources where instances of the vulnerability are found should be updated to the latest version of OpenSSH. Additionally, an investigation should be initiated to ensure no malicious connections were established with the vulnerable cloud resources. Furthermore, CVE-2024-7589, another vulnerability, stems from RegreSSHion, which was disclosed in July and can also lead to unauthenticated RCE with root privileges in glibc-based Linux systems. Therefore, addressing these vulnerabilities is crucial to maintaining secure networking utilities based on the SSH protocol.
Description last updated: 2024-10-17T12:40:41.270Z