OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
-
Package | Type | OS Name | OS Version | Affected Ranges | Fix Versions |
---|---|---|---|---|---|
debian/openssh | deb | debian | 12 | >=1:9.2p1-2+deb12u2 | Not yet available |
debian/openssh | deb | debian | unstable | >=1:9.7p1-5 | Not yet available |
debian/openssh | deb | debian | 13 | >=1:9.7p1-5 | Not yet available |
debian/openssh | deb | debian | 10 | >=1:7.9p1-10+deb10u2 | Not yet available |
debian/openssh | deb | debian | 11 | >=1:8.4p1-5+deb11u3 | Not yet available |
Severity and metrics
No CVSS data available from this source.
1
1.0
1.0
CVE-2023-51767
-
CVE-2023-51767
-