vulnerability
Red Hat: CVE-2023-38408: Remote code execution in ssh-agent PKCS#11 support (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | 2023-07-20 | 2023-08-01 | 2025-01-28 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
2023-07-20
Added
2023-08-01
Modified
2025-01-28
Description
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
Solution(s)
redhat-upgrade-opensshredhat-upgrade-openssh-askpassredhat-upgrade-openssh-askpass-debuginforedhat-upgrade-openssh-cavsredhat-upgrade-openssh-cavs-debuginforedhat-upgrade-openssh-clientsredhat-upgrade-openssh-clients-debuginforedhat-upgrade-openssh-debuginforedhat-upgrade-openssh-debugsourceredhat-upgrade-openssh-keycatredhat-upgrade-openssh-keycat-debuginforedhat-upgrade-openssh-ldapredhat-upgrade-openssh-ldap-debuginforedhat-upgrade-openssh-serverredhat-upgrade-openssh-server-debuginforedhat-upgrade-openssh-server-sysvinitredhat-upgrade-openssh-sk-dummy-debuginforedhat-upgrade-pam_ssh_agent_authredhat-upgrade-pam_ssh_agent_auth-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.