Description
OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
- Attack Vector
- network
- Complexity
- high
- Privileges
- none
- User Action
- none
- Scope
- unchanged
- Confidentiality
- none
- Integrity
- low
- Availability
- high
- Weaknesses
- CWE-415
Metadata
- Primary Vendor
- OPENBSD
- Published
- 2/3/2023
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
openbsd : opensshfedoraproject : fedorafedoraproject : fedoranetapp : ontap_select_deploy_administration_utilitynetapp : a250_firmwarenetapp : 500f_firmwarenetapp : c250_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.