CVE Vulnerabilities

CVE-2023-25136

Double Free

Published: Feb 03, 2023 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states remote code execution is theoretically possible.

Weakness

The product calls free() twice on the same memory address.

Affected Software

NameVendorStart VersionEnd Version
OpensshOpenbsd9.1 (including)9.1 (including)
Red Hat Enterprise Linux 9RedHatopenssh-0:8.7p1-29.el9_2*
Red Hat Enterprise Linux 9RedHatopenssh-0:8.7p1-29.el9_2*
OpensshUbuntutrusty*
OpensshUbuntuupstream*
OpensshUbuntuxenial*
Openssh-ssh1Ubuntuupstream*

Potential Mitigations

References