OpenSSH AES-GCM Memory Corruption Vulnerability
RISK: Medium Risk
TYPE: Servers - Other Servers
A vulnerability has been identified in OpenSSH. A remote authenticated user can bypass access control restrictions.
A remote authenticated user can send specially crafted data to trigger a memory corruption flaw when an AES-GCM cipher is selected during key exchange to execute arbitrary code on the target system. The code will run with the privileges of the target user.
This can be exploited to bypass login shell restrictions.
Impact
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Versions 6.2, 6.3
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- The vendor has issued a fix (6.4). A patch for versions 6.2 and 6.3 is also available.
Vulnerability Identifier
Source
Related Link
Share with