| VID |
14157 |
| Severity |
40 |
| Port |
22 |
| Protocol |
TCP |
| Class |
SSH |
| Detailed Description |
The version of OpenSSH installed on the remote host is 9.1. It is, therefore, affected by a double-free vulnerability during options.kex_algorithms handling.
The double free can be triggered by an unauthenticated attacker in the default configuration; however, the vulnerability discoverer reports that 'exploiting this vulnerability will not be easy.
* References: https://www.openssh.com/txt/release-9.2 https://www.openwall.com/lists/oss-security/2023/02/02/2
* Platforms Affected: OpenSSH prior to 9.1 Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of OpenSSH (9.2 or later), available from the OpenSSH Web site at http://www.openssh.org/ |
| Related URL |
CVE-2023-25136 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|