First published: Fri Feb 03 2023(Updated: )
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openssh Openssh | =9.1 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
NetApp ONTAP Select Deploy administration utility | ||
Netapp A250 Firmware | ||
Netapp A250 | ||
Netapp 500f Firmware | ||
Netapp 500f | ||
Netapp C250 Firmware | ||
Netapp C250 | ||
Openbsd Openssh | =9.1 | |
All of | ||
Netapp A250 Firmware | ||
Netapp A250 | ||
All of | ||
Netapp 500f Firmware | ||
Netapp 500f | ||
All of | ||
Netapp C250 Firmware | ||
Netapp C250 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSSH server vulnerability is CVE-2023-25136.
The severity level of CVE-2023-25136 is medium with a CVSS score of 6.5.
OpenSSH server version 9.1 introduced this vulnerability.
Yes, this vulnerability has been fixed in OpenSSH server version 9.2.
Yes, an unauthenticated remote attacker can exploit this vulnerability.