КућаУправљање ризицимаVulnerability in OpenSSH called regreSSHion places millions of servers in jeopardy

Vulnerability in OpenSSH called regreSSHion places millions of servers in jeopardy

Објављено на

spot_img

Researchers have detailed a new exploit that takes advantage of a vulnerability in the OpenSSH software, demonstrating how a targeted attack could potentially lead to remote code execution with a root shell. The exploit targets Linux systems using the glibc C library, specifically focusing on 32-bit versions where the Address Space Layout Randomization (ASLR) is less effective due to the reduced memory space.

In a technical advisory published by the researchers, they explained the theoretical and practical aspects of the exploit. They highlighted the need to find a specific code path in sshd that, if interrupted at the right time by SIGALRM, would leave the system in an inconsistent state that could be exploited. The researchers emphasized the challenge of reaching this code path and maximizing the chances of interrupting it at the right moment, particularly when attempting to trigger the exploit remotely.

During their testing, the researchers targeted OpenSSH 9.2p1 on a Debian Linux i386 system. They found that it took approximately 10,000 attempts to successfully exploit the vulnerability and achieve remote code execution. This process involved creating 100 concurrent connections with a default LoginGraceTime of 120 seconds. However, due to the unpredictability caused by ASLR in the glibc library, correctly guessing the memory address added to the complexity of the exploit.

On 64-bit systems, the researchers noted that while exploitation is still possible, it may be more challenging compared to 32-bit systems. The increased memory space and stronger ASLR implementation on 64-bit systems could result in longer exploitation times. In their testing, achieving remote code execution with a root shell on a 64-bit system could take between 6-8 hours due to the difficulties in accurately guessing memory addresses.

The researchers’ findings underscore the importance of addressing vulnerabilities in critical software components like OpenSSH. By highlighting the potential risks associated with exploitable flaws, they aim to raise awareness among system administrators and developers about the need for robust security measures. As cyber threats continue to evolve, staying vigilant and proactive in addressing security vulnerabilities is essential to safeguarding systems and data from malicious attacks.

Overall, the researchers’ work serves as a reminder of the ongoing challenges in cybersecurity and the need for constant monitoring and mitigation of potential threats. With new exploits and vulnerabilities emerging regularly, the importance of timely software updates and patches cannot be understated in maintaining a secure and resilient IT infrastructure.

Извор линк

Најновији чланци

Chinese hackers take advantage of software vulnerability in Cisco systems – Baseline

Chinese hackers have recently been exploiting a software flaw in Cisco products, specifically targeting...

Microsoft discovers critical vulnerabilities in Rockwell PanelView Plus

In a recent development, Microsoft's cybersecurity team has shed light on two significant vulnerabilities...

Gogs Vulnerabilities Allow Attackers to Hack Instances and Steal Source Code

The cybersecurity researchers at SonarSource recently uncovered several vulnerabilities in the popular open-source code...

FedRAMP Introduces Fresh Framework for Emerging Technologies

The U.S. federal government has recently introduced a new framework designed to prioritize emerging...

Више овако

Chinese hackers take advantage of software vulnerability in Cisco systems – Baseline

Chinese hackers have recently been exploiting a software flaw in Cisco products, specifically targeting...

Microsoft discovers critical vulnerabilities in Rockwell PanelView Plus

In a recent development, Microsoft's cybersecurity team has shed light on two significant vulnerabilities...

Gogs Vulnerabilities Allow Attackers to Hack Instances and Steal Source Code

The cybersecurity researchers at SonarSource recently uncovered several vulnerabilities in the popular open-source code...
sr_RSSerbian