CVE-2024-6387 (CNNVD-202407-017)

HIGH 有利用代码
中文标题:
OpenSSH 竞争条件问题漏洞
英文标题:
Openssh: regresshion - race condition in ssh allows rce/dos
CVSS分数: 8.1
发布时间: 2024-07-01 12:37:25
漏洞类型: 竞争条件问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在竞争条件问题漏洞,该漏洞源于信号处理程序中存在竞争条件,攻击者利用该漏洞可以在无需认证的情况下远程执行任意代码并获得系统控制权。

英文描述:

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CWE类型:
CWE-362 CWE-364
标签:
remote linux Milad karimi
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Red Hat Red Hat Enterprise Linux 9 9 - - cpe:/o:redhat:enterprise_linux:9::baseos
Red Hat Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions 9.0 - - cpe:/a:redhat:rhel_e4s:9.0::appstream
Red Hat Red Hat Enterprise Linux 9.2 Extended Update Support 9.2 - - cpe:/o:redhat:rhel_eus:9.2::baseos
Red Hat Red Hat OpenShift Container Platform 4.13 4.13 - - cpe:/a:redhat:openshift:4.13::el8
Red Hat Red Hat OpenShift Container Platform 4.14 4.14 - - cpe:/a:redhat:openshift:4.14::el9
Red Hat Red Hat OpenShift Container Platform 4.15 4.15 - - cpe:/a:redhat:openshift:4.15::el9
Red Hat Red Hat OpenShift Container Platform 4.16 4.16 - - cpe:/a:redhat:openshift:4.16::el9
Red Hat Red Hat Ceph Storage 5 - - - cpe:/a:redhat:ceph_storage:5
Red Hat Red Hat Ceph Storage 6 - - - cpe:/a:redhat:ceph_storage:6
Red Hat Red Hat Ceph Storage 7 - - - cpe:/a:redhat:ceph_storage:7
Red Hat Red Hat Enterprise Linux 10 - - - cpe:/o:redhat:enterprise_linux:10
Red Hat Red Hat Enterprise Linux 6 - - - cpe:/o:redhat:enterprise_linux:6
Red Hat Red Hat Enterprise Linux 7 - - - cpe:/o:redhat:enterprise_linux:7
Red Hat Red Hat Enterprise Linux 8 - - - cpe:/o:redhat:enterprise_linux:8
sonicwall sma_6200_firmware - - - cpe:2.3:o:sonicwall:sma_6200_firmware:-:*:*:*:*:*:*:*
sonicwall sma_7200_firmware - - - cpe:2.3:o:sonicwall:sma_7200_firmware:-:*:*:*:*:*:*:*
arista eos * - - cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
canonical ubuntu_linux 23.10 - - cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*
canonical ubuntu_linux 24.04 - - cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
almalinux almalinux 9.0 - - cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:*
sonicwall sma_6210_firmware - - - cpe:2.3:o:sonicwall:sma_6210_firmware:-:*:*:*:*:*:*:*
sonicwall sma_7210_firmware - - - cpe:2.3:o:sonicwall:sma_7210_firmware:-:*:*:*:*:*:*:*
sonicwall sma_8200v_firmware - - - cpe:2.3:o:sonicwall:sma_8200v_firmware:-:*:*:*:*:*:*:*
sonicwall sra_ex_7000_firmware - - - cpe:2.3:o:sonicwall:sra_ex_7000_firmware:-:*:*:*:*:*:*:*
netapp a1k_firmware - - - cpe:2.3:o:netapp:a1k_firmware:-:*:*:*:*:*:*:*
netapp a70_firmware - - - cpe:2.3:o:netapp:a70_firmware:-:*:*:*:*:*:*:*
netapp a90_firmware - - - cpe:2.3:o:netapp:a90_firmware:-:*:*:*:*:*:*:*
netapp a700s_firmware - - - cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*
netapp 8300_firmware - - - cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*
netapp 8700_firmware - - - cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*
netapp a400_firmware - - - cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*
netapp c400_firmware - - - cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*
netapp a250_firmware - - - cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
netapp 500f_firmware - - - cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
netapp c250_firmware - - - cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
netapp a800_firmware - - - cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*
netapp c800_firmware - - - cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*
netapp a900_firmware - - - cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*
netapp a9500_firmware - - - cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*
netapp c190_firmware - - - cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*
netapp a150_firmware - - - cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*
netapp a220_firmware - - - cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*
netapp fas2720_firmware - - - cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*
netapp fas2750_firmware - - - cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*
netapp fas2820_firmware - - - cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*
netapp bootstrap_os - - - cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
apple macos * - - cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
openbsd openssh * - - cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
openbsd openssh 4.4 - - cpe:2.3:a:openbsd:openssh:4.4:-:*:*:*:*:*:*
openbsd openssh 8.5 - - cpe:2.3:a:openbsd:openssh:8.5:p1:*:*:*:*:*:*
openbsd openssh 8.6 - - cpe:2.3:a:openbsd:openssh:8.6:-:*:*:*:*:*:*
redhat openshift_container_platform 4.0 - - cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
redhat enterprise_linux 9.0 - - cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
redhat enterprise_linux_eus 9.4 - - cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
redhat enterprise_linux_for_arm_64 9.0_aarch64 - - cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
redhat enterprise_linux_for_arm_64_eus 9.4_aarch64 - - cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*
redhat enterprise_linux_for_ibm_z_systems 9.0_s390x - - cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
redhat enterprise_linux_for_ibm_z_systems_eus 9.4_s390x - - cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_little_endian 9.0_ppc64le - - cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
redhat enterprise_linux_for_power_little_endian_eus 9.4_ppc64le - - cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 9.4 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*
suse linux_enterprise_micro 6.0 - - cpe:2.3:o:suse:linux_enterprise_micro:6.0:*:*:*:*:*:*:*
debian debian_linux 12.0 - - cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
canonical ubuntu_linux 22.04 - - cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
canonical ubuntu_linux 22.10 - - cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:*
canonical ubuntu_linux 23.04 - - cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:lts:*:*:*
amazon amazon_linux 2023.0 - - cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:*
netapp active_iq_unified_manager - - - cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
netapp e-series_santricity_os_controller * - - cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
netapp ontap 9 - - cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
netapp ontap_select_deploy_administration_utility - - - cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
netapp ontap_tools 9 - - cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*
netapp ontap_tools 10 - - cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
freebsd freebsd 13.2 - - cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*
freebsd freebsd 13.3 - - cpe:2.3:o:freebsd:freebsd:13.3:-:*:*:*:*:*:*
freebsd freebsd 14.0 - - cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*
freebsd freebsd 14.1 - - cpe:2.3:o:freebsd:freebsd:14.1:-:*:*:*:*:*:*
netbsd netbsd * - - cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2024:4312 vendor-advisory
cve.org
访问
RHSA-2024:4340 vendor-advisory
cve.org
访问
RHSA-2024:4389 vendor-advisory
cve.org
访问
RHSA-2024:4469 vendor-advisory
cve.org
访问
RHSA-2024:4474 vendor-advisory
cve.org
访问
RHSA-2024:4479 vendor-advisory
cve.org
访问
RHSA-2024:4484 vendor-advisory
cve.org
访问
无标题 vdb-entry
cve.org
访问
RHBZ#2294604 issue-tracking
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
Download Exploit EDB-52269 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2024-6387 ADVISORY
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
8.1
CVSS向量: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2024-07-01 12:37:25
修改时间:
2025-07-24 13:11:10
创建时间:
2025-11-11 15:39:56
更新时间:
2025-11-11 17:02:38
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2024-6387 2025-11-11 15:22:55 2025-11-11 07:39:56
NVD nvd_CVE-2024-6387 2025-11-11 14:59:58 2025-11-11 07:47:48
CNNVD cnnvd_CNNVD-202407-017 2025-11-11 15:12:09 2025-11-11 07:58:56
EXPLOITDB exploitdb_EDB-52269 2025-11-11 15:05:26 2025-11-11 09:02:38
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 17:02:38
references_count: 79 → 81; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 79 -> 81
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:58:56
vulnerability_type: 未提取 → 竞争条件问题; cnnvd_id: 未提取 → CNNVD-202407-017; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 竞争条件问题
  • cnnvd_id: 未提取 -> CNNVD-202407-017
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:47:48
affected_products_count: 15 → 78; references_count: 12 → 79; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 15 -> 78
  • references_count: 12 -> 79
  • data_sources: ['cve'] -> ['cve', 'nvd']