ASA-202407-1 - log back

ASA-202407-1 edited at 01 Jul 2024 18:43:08
ASA-202407-1 edited at 01 Jul 2024 17:12:20
Impact
- It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials. During upgrade, the sshd service must be restarted right away using the same connection to avoid being locked out.
+ A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials. During upgrade, the sshd service must be restarted right away using the same connection to avoid being locked out.
ASA-202407-1 edited at 01 Jul 2024 17:12:00
ASA-202407-1 edited at 01 Jul 2024 17:10:26
Workaround
+ Set LoginGraceTime to 0 in /etc/ssh/sshd_config. This makes sshd vulnerable to a denial of service (the exhaustion of all MaxStartups connections), but it makes it safe from this vulnerability.
Impact
+ It was discovered that OpenSSH incorrectly handled signal management. A remote attacker could use this issue to bypass authentication and remotely access systems without proper credentials. During upgrade, the sshd service must be restarted right away using the same connection to avoid being locked out.
ASA-202407-1 created at 01 Jul 2024 17:05:38