CVE-2023-38408
CRITICAL | Platform: macOS | Changelog
CVE Details
Description
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVSS 3.1 Score
| Metric | Value |
|---|---|
| Base Score | 9.8 (CRITICAL) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Weakness
References
- Apple Security Advisory
- NVD Entry
- http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html (Exploit, Third Party Advisory, VDB Entry)
- http://www.openwall.com/lists/oss-security/2023/07/20/1 (Exploit, Mailing List, Third Party Advisory)
- http://www.openwall.com/lists/oss-security/2023/07/20/2 (Mailing List, Third Party Advisory)
- http://www.openwall.com/lists/oss-security/2023/09/22/11
- http://www.openwall.com/lists/oss-security/2023/09/22/9
- https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent (Third Party Advisory)
- https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8 (Patch)
- https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d (Patch)