Skip to main content

OpenSSH AES-GCM Memory Corruption Vulnerability

Last Update Date: 12 Nov 2013 10:28 Release Date: 12 Nov 2013 3349 Views

RISK: Medium Risk

TYPE: Servers - Other Servers

TYPE: Other Servers

A vulnerability has been identified in OpenSSH. A remote authenticated user can bypass access control restrictions.

 

A remote authenticated user can send specially crafted data to trigger a memory corruption flaw when an AES-GCM cipher is selected during key exchange to execute arbitrary code on the target system. The code will run with the privileges of the target user.

 

This can be exploited to bypass login shell restrictions.


Impact

  • Remote Code Execution
  • Security Restriction Bypass

System / Technologies affected

  • Versions 6.2, 6.3

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • The vendor has issued a fix (6.4). A patch for versions 6.2 and 6.3 is also available.

Vulnerability Identifier


Source


Related Link