vulnerability
FreeBSD: VID-291d0953-47c1-11ee-8e38-002590c1f29c (CVE-2023-38408): FreeBSD -- Potential remote code execution via ssh-agent forwarding
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Aug 31, 2023 | Aug 31, 2023 | Dec 10, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Aug 31, 2023
Added
Aug 31, 2023
Modified
Dec 10, 2025
Description
Problem Description: The server may cause ssh-agent to load shared libraries other than those required for PKCS#11 support. These shared libraries may have side effects that occur on load and unload (dlopen and dlclose). Impact: An attacker with access to a server that accepts a forwarded ssh-agent connection may be able to execute code on the machine running ssh-agent. Note that the attack relies on properties of operating system-provided libraries. This has been demonstrated on other operating systems; it is unknown whether this attack is possible using the libraries provided by a FreeBSD installation.
Solutions
freebsd-upgrade-base-13_2-release-p2freebsd-upgrade-base-13_1-release-p9freebsd-upgrade-base-12_4-release-p4freebsd-upgrade-package-openssh-portablefreebsd-upgrade-package-openssh-portable-hpnfreebsd-upgrade-package-openssh-portable-gssapi
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.