diff options
author | Bryan Drewery <bdrewery@FreeBSD.org> | 2023-07-21 14:36:50 +0000 |
---|---|---|
committer | Bryan Drewery <bdrewery@FreeBSD.org> | 2023-07-21 14:36:50 +0000 |
commit | 22e2030b6eabc631ee06eb91b0980075705a5b55 (patch) | |
tree | c2475577494402f9d98e57405f15b8023fc8aa6f /security/vuxml/vuln/2023.xml | |
parent | f6d0388dfe5fbdaba1ca9a7896cbb91f11609051 (diff) | |
download | ports-22e2030b6eabc631ee06eb91b0980075705a5b55.tar.gz ports-22e2030b6eabc631ee06eb91b0980075705a5b55.zip |
security/vuxml: Add entry for OpenSSH CVE-2023-38408
Diffstat (limited to 'security/vuxml/vuln/2023.xml')
-rw-r--r-- | security/vuxml/vuln/2023.xml | 44 |
1 files changed, 44 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index b5441db924c2..38c2114a663a 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,47 @@ + <vuln vid="887eb570-27d3-11ee-adba-c80aa9043978"> + <topic>OpenSSH -- remote code execution via a forwarded agent socket</topic> + <affects> + <package> + <name>openssh-portable</name> + <name>openssh-portable-hpn</name> + <name>openssh-portable-gssapi</name> + <range><lt>9.3.p2,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>OpenSSH project reports:</p> + <blockquote cite="https://www.openssh.com/txt/release-9.3p2"> + <p>Fix CVE-2023-38408 - a condition where specific libaries loaded via + ssh-agent(1)'s PKCS#11 support could be abused to achieve remote + code execution via a forwarded agent socket if the following + conditions are met: + + * Exploitation requires the presence of specific libraries on + the victim system. + * Remote exploitation requires that the agent was forwarded + to an attacker-controlled system. + + Exploitation can also be prevented by starting ssh-agent(1) with an + empty PKCS#11/FIDO allowlist (ssh-agent -P '') or by configuring + an allowlist that contains only specific provider libraries. + + This vulnerability was discovered and demonstrated to be exploitable + by the Qualys Security Advisory team. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-38408</cvename> + <url>https://www.openssh.com/txt/release-9.3p2</url> + </references> + <dates> + <discovery>2023-07-19</discovery> + <entry>2023-07-21</entry> + </dates> + </vuln> + <vuln vid="2f22927f-26ea-11ee-8290-a8a1599412c6"> <topic>chromium -- multiple vulnerabilities</topic> <affects> |