Statements (21)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security
|
| gptkbp:affects |
gptkb:OpenSSH
|
| gptkbp:alias |
regreSSHion
|
| gptkbp:describes |
A signal handler race condition in OpenSSH's server (sshd) in the default configuration on glibc-based Linux systems allows unauthenticated remote code execution as root.
|
| gptkbp:hasAttackVector |
gptkb:network_protocol
|
| gptkbp:hasCVEID |
gptkb:CVE-2024-6387
|
| gptkbp:hasCVSSScore |
8.1
|
| gptkbp:hasCWE |
CWE-362
|
| gptkbp:hasExploitStatus |
Public exploit available
|
| gptkbp:hasSeverity |
Critical
|
| gptkbp:hasVersion |
OpenSSH 8.5p1 to 9.7p1
|
| gptkbp:influencedBy |
gptkb:Privilege_Escalation
Remote Code Execution |
| gptkbp:isPatchedIn |
OpenSSH 9.8p1
|
| gptkbp:publicationDate |
2024-07-01
|
| gptkbp:referencedIn |
https://nvd.nist.gov/vuln/detail/CVE-2024-6387
https://www.qualys.com/2024/07/01/cve-2024-6387/regreSSHion.txt https://www.openwall.com/lists/oss-security/2024/07/01/4 |
| gptkbp:bfsParent |
gptkb:APT3
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
CVE-2024-6387
|