OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Linux(2 tweets) OpenSSL(1 tweets)
List of frequently cited URLs
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
alerts.vulmon.com | 222 |
cvetrends.com | 49 |
news.ycombinator.com | 7 |
thehackernews.com | 6 |
www.it-connect.fr | 6 |
twitter.com | 5 |
github.com | 4 |
blog.qualys.com | 4 |
jfrog.com | 3 |
seclists.org | 3 |
frycos.github.io | 3 |
www.da.vidbuchanan.co.uk | 3 |
Name | URL |
---|---|
Christbowel/CVE-2023-25136 | https://github.com/Christbowel/CVE-2023-25136 |
jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free | https://github.com/jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free |
ticofookfook/CVE-2023-25136 | https://github.com/ticofookfook/CVE-2023-25136 |
Name | URL |
---|---|
Christbowel/CVE-2023-25136 | github.com |
jfrog/jfrog-CVE-2023-25136-OpenSSH_Double-Free | github.com |
ticofookfook/CVE-2023-25136 | github.com |