First published: Thu Jul 20 2023(Updated: )
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for <a href="https://access.redhat.com/security/cve/CVE-2016-10009">CVE-2016-10009</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | <9.3p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2224173 is high due to the potential for remote code execution.
To fix REDHAT-BUG-2224173, upgrade to OpenSSH version 9.3p2 or later.
REDHAT-BUG-2224173 affects versions of OpenSSH prior to 9.3p2 on various systems.
The vulnerability in REDHAT-BUG-2224173 is caused by an insufficiently trustworthy search path in the PKCS#11 feature of ssh-agent.
Yes, REDHAT-BUG-2224173 can be exploited by an attacker if an agent is forwarded to a system they control.