CVE-2023-51767

OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

27 Feb 2024, 15:51

Type Values Removed Values Added
First Time Openbsd openssh
Openbsd
CPE cpe:2.3:a:openssh:openssh:*:*:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*

29 Jan 2024, 20:00

Type Values Removed Values Added
References () https://security.netapp.com/advisory/ntap-20240125-0006/ - () https://security.netapp.com/advisory/ntap-20240125-0006/ - Third Party Advisory
References () https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878 - Patch () https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878 - Product
References () https://ubuntu.com/security/CVE-2023-51767 - () https://ubuntu.com/security/CVE-2023-51767 - Third Party Advisory
References () https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77 - Patch () https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77 - Product

25 Jan 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240125-0006/ -

16 Jan 2024, 17:15

Type Values Removed Values Added
References
  • () https://ubuntu.com/security/CVE-2023-51767 -

04 Jan 2024, 19:18

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:a:openssh:openssh:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
References () https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878 - () https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878 - Patch
References () https://arxiv.org/abs/2309.02545 - () https://arxiv.org/abs/2309.02545 - Technical Description
References () https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77 - () https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77 - Patch
References () https://access.redhat.com/security/cve/CVE-2023-51767 - () https://access.redhat.com/security/cve/CVE-2023-51767 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2255850 - () https://bugzilla.redhat.com/show_bug.cgi?id=2255850 - Issue Tracking, Third Party Advisory
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0

26 Dec 2023, 17:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/security/cve/CVE-2023-51767 -
  • () https://bugzilla.redhat.com/show_bug.cgi?id=2255850 -

24 Dec 2023, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-24 07:15

Updated : 2024-02-27 15:51


NVD link : CVE-2023-51767

Mitre link : CVE-2023-51767

CVE.ORG link : CVE-2023-51767


JSON object : View

Products Affected

redhat

  • enterprise_linux

fedoraproject

  • fedora

openbsd

  • openssh