中危 OpenSSH ssh-agent转发 客户端远程代码执行漏洞(CVE-2023-38408)
CVE编号
CVE-2023-38408利用情况
POC 已公开补丁情况
官方补丁披露时间
2023-07-20漏洞描述
SSH-Agent是SSH的一部分,它是一个用于管理私钥并支持公钥身份验证的程序。 用户使用 SSH-Agent 转发代理功能连接攻击者恶意服务器时,由于 SSH-Agent 未对加载的共享库进行限制,攻击者可通过将恶意共享库作为参数传递给 SSH-Agent 并通过其调用dlopen/dlclose函数加载/卸载位于用户客户端主机的共享库,实现远程代码执行。解决建议
"避免使用ssh-agent代理转发功能"受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | openbsd | openssh | * | Up to (excluding) 9.3 | |||||
运行在以下环境 | |||||||||
应用 | openbsd | openssh | 9.3 | - | |||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | openssh-ldap | * | Up to (excluding) 7.4p1-23.1.al7 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.16 | openssh | * | Up to (excluding) 9.0_p1-r4 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.17 | openssh | * | Up to (excluding) 9.1_p1-r4 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | openssh | * | Up to (excluding) 7.4p1-22.amzn2.0.3 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2023 | openssh | * | Up to (excluding) 0.10.4-4.8.amzn2023.0.7 | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | openssh | * | Up to (excluding) 7.4p1-22.80.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_7 | openssh-server | * | Up to (excluding) 7.4p1-23 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | openssh-server | * | Up to (excluding) 0.10.3-7.18.0.1 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | openssh | * | Up to (excluding) 1:7.9p1-10+deb10u3 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | openssh | * | Up to (excluding) 1:8.4p1-5+deb11u2 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | openssh | * | Up to (excluding) 1:9.2p1-2+deb12u1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | openssh | * | Up to (excluding) 1:9.3p2-1 | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 37 | - | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 38 | - | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | openssh | * | Up to (excluding) 8.8p1-11.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | openssh | * | Up to (excluding) 9.0p1-16.fc38 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10 | openssh | * | Up to (excluding) 7.4p1-23.el7_9.ns7.01 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP1 | openssh | * | Up to (excluding) 8.2p1-9.p11.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP2 | openssh | * | Up to (excluding) 8.2p1-9.p11.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP3 | openssh | * | Up to (excluding) 8.2p1-16.p08.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP1 | openssh | * | Up to (excluding) 8.2p1-9.p11.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP3 | openssh | * | Up to (excluding) 8.2p1-16.p08.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10 | openssh | * | Up to (excluding) 7.4p1-23.el7_9.ns7.01 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP1 | openssh | * | Up to (excluding) 8.2p1-9.p11.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP2 | openssh | * | Up to (excluding) 8.2p1-9.p11.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP3 | openssh | * | Up to (excluding) 8.2p1-16.p08.ky10 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_5.3 | openssh-clients-8.4p1 | * | Up to (excluding) 150300.3.22.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | openssh-clients-8.4p1 | * | Up to (excluding) 150300.3.22.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.5 | openssh-clients-8.4p1 | * | Up to (excluding) 150300.3.22.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_6 | oraclelinux-release | * | Up to (excluding) 5.3p1-124.0.2.el6_10 | |||||
运行在以下环境 | |||||||||
系统 | oracle_7 | oraclelinux-release | * | Up to (excluding) 7.4p1-23.0.1.el7_9_fips | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 8.0p1-19.el8_8 | |||||
运行在以下环境 | |||||||||
系统 | oracle_9 | oraclelinux-release | * | Up to (excluding) 8.7p1-30.el9_2 | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | openssh | * | Up to (excluding) 7.4p1-23.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | openssh | * | Up to (excluding) 8.0p1-19.el8_8 | |||||
运行在以下环境 | |||||||||
系统 | redhat_9 | openssh-debugsource | * | Up to (excluding) 8.7p1-30.el9_2 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | openssh-7.2p2 | * | Up to (excluding) 81.4.2 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | openssh | * | Up to (excluding) 1:8.2p1-4ubuntu0.8 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_22.04 | openssh | * | Up to (excluding) 1:8.9p1-3ubuntu0.3 | |||||
运行在以下环境 | |||||||||
系统 | unionos_a | openssh | * | Up to (excluding) openssh-8.2p1-20.up1.0.2.uelc20.04 | |||||
运行在以下环境 | |||||||||
系统 | unionos_d | openssh | * | Up to (excluding) 1:7.9p1.11-deepin1 | |||||
运行在以下环境 | |||||||||
系统 | unionos_e | openssh | * | Up to (excluding) openssh-8.2p1-20.up1.uel20.04 | |||||
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 POC 已公开
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 服务器失陷
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-428 | 未经引用的搜索路径或元素 |
Exp相关链接
- avd.aliyun.com
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论