漏洞描述 Openssh Server 中8.5p1 和 9.7p1 之间的版本中存在一处条件竞争漏洞,如果客户端在 120 秒内没有进行身份验证(由 LoginGraceTime 定义的设置),则 sshd 的 SIGALRM 处理程序会以一种非异步信号安全的方式异步调用,成功的利用此漏洞可以导致远程攻击者以root的权限执行远程代码。漏洞编号:CVE-2024-6387,漏洞危害等级:严重。
相关漏洞推荐 POC CVE-2025-32433: Erlang/OTP SSH - Remote Code Execution POC CVE-2018-16059: WirelessHART Fieldgate SWG70 3.0 - Local File Inclusion POC CVE-2023-48795: OpenSSH Terrapin Attack - Detection POC CVE-2001-1473: Deprecated SSHv1 Protocol Detection POC CVE-2001-1473: Deprecated SSHv1 Protocol Detection POC unrestricted-ssh-access: Unrestricted - SSH Access POC iam-ssh-keys-rotation: SSH Key Rotation - 90-Day Policy POC gcloud-vm-project-ssh-keys-enabled: Block Project-Wide SSH Keys Not Enabled POC ssh-gssapiauthentication-disabled: sshd GSSAPIAuthentication - Disabled POC ssh-hostbasedauth-disabled: Ensure SSH HostbasedAuthentication - Disabled POC privesc-ssh-agent: ssh-agent - Privilege Escalation POC privesc-sshpass: sshpass - Privilege Escalation POC file-disable-ssh-forwarding: Disable SSH Forwarding