81 points

They have named this vulnerability “regreSSHion”, since it represents the re-emergence of a bug that was previously patched in 2006

That’s a great name

permalink
report
reply
7 points

Agreed, but I had to disable autocorrect to type it on my phone.

permalink
report
parent
reply
2 points

Playful and descriptive!

permalink
report
parent
reply
54 points

The new vulnerability, assigned CVE-2024-6387, allows for unauthenticated remote code execution (RCE) with root privileges, posing a severe threat to affected systems.

Oh, fuck. Guess this is my day now.

permalink
report
reply
38 points

If I’m not mistaken, it seems like this is a timing attack and you need a lot of attack attempts to make it work. If you have like a fail2ban rule for ssh it should mitigate this attack to quite some degree, right? (Of course updating would still be the best).

permalink
report
reply
12 points

While statistically unlikely, it would be possible to exploit the vulnerability on the first attempt

permalink
report
parent
reply
4 points

That’s true.

permalink
report
parent
reply
33 points

Looks like Debian and Ubuntu have shipped patches, but I’m not seeing them show up in the RHEL-derivatives just yet, but I’m sure that’ll be soon™.

permalink
report
reply
28 points

the in depth technical details

TL;DR; sigalarm handler calls syslog which isn’t safe to call from a signal handler context.

Their example exploit needed about 10k attempts to get a remote shell so it’s not fast or quiet, but a neat find regardless

permalink
report
reply
5 points

I can already imagine the log generated will be a hint. We usually automate those anyway as it is closer to (D)DoS too.

permalink
report
parent
reply

Linux

!linux@programming.dev

Create post

A community for everything relating to the linux operating system

Also check out !linux_memes@programming.dev

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

Community stats

  • 2.7K

    Monthly active users

  • 456

    Posts

  • 3.2K

    Comments