ID CVE-2023-25136
Summary OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
References
Vulnerable Configurations
  • cpe:2.3:a:openbsd:openssh:9.1:*:*:*:*:*:*:*
    cpe:2.3:a:openbsd:openssh:9.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
    cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
  • cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*
    cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*
  • cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*
    cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*
  • cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*
    cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE CWE-415
CAPEC
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 27-02-2024 - 15:15
Published 03-02-2023 - 06:15
Last modified 27-02-2024 - 15:15
Back to Top