First published: Wed Jul 19 2023(Updated: )
OpenSSH. This issue was addressed by updating OpenSSH to 9.3p2
Credit: baba yaga an anonymous researcher cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | <9.3 | |
Openbsd Openssh | =9.3 | |
Openbsd Openssh | =9.3-p1 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
ubuntu/openssh | <9.3 | 9.3 |
ubuntu/openssh | <1:8.2 | 1:8.2 |
ubuntu/openssh | <1:8.9 | 1:8.9 |
ubuntu/openssh | <1:9.0 | 1:9.0 |
ubuntu/openssh | <1:7.6 | 1:7.6 |
ubuntu/openssh | <1:6.6 | 1:6.6 |
ubuntu/openssh | <1:7.2 | 1:7.2 |
ubuntu/openssh | <1:9.3 | 1:9.3 |
debian/openssh | <=1:7.9p1-10+deb10u2 | 1:7.9p1-10+deb10u4 1:8.4p1-5+deb11u3 1:9.2p1-2+deb12u2 1:9.6p1-4 1:9.6p1-5 |
Apple macOS Sonoma | <14 | 14 |
IBM AIX | <=7.2 | |
IBM AIX | <=7.3 | |
IBM VIOS | <=3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-38408 is a vulnerability in OpenSSH that allows for remote code execution if an agent is forwarded to an attacker-controlled system.
CVE-2023-38408 has a severity rating of 9.8, which is considered critical.
CVE-2023-38408 affects OpenSSH versions before 9.3p2.
To fix CVE-2023-38408, update OpenSSH to version 9.3p2 or later.
You can find more information about CVE-2023-38408 in the references provided: [link1](https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8), [link2](https://www.openssh.com/txt/release-9.3p2), [link3](https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt)