The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution (CVE-2023-38408)
22721
07 November 2023
07 November 2023
CLOSED
MEDIUM
9.8 CRITICAL - Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-38408
Brocade Security Advisory ID |
BSA-2023-2322 |
Component |
OpenSSH |
|
|
Summary
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
Products Affected
- The vulnerability affects the underlying OS of Brocade ASCG - Security update provided in Brocade ASCG v3.0 OVA.
Products Confirmed Not Affected
- Brocade Fabric OS
- Brocade SANnav
Solution
Brocade has released security updates that address the vulnerabilities described in this advisory. Brocade Customers should obtain the security updates through their usual update channels.
While FOS is not exposed, future releases of Brocade Fabric OS will remove the vulnerable component to avoid false positive detections from security scanners
Credit
The issue was discovered during security testing.
Revision History
Version |
Change |
Date |
1.0 |
Initial Publication |
November 7, 2023 |
Disclaimer
THIS DOCUMENT IS PROVIDED ON AN AS-IS BASIS SOLELY FOR INFORMATIONAL PURPOSES AND DOES NOT IMPLY ANY KIND OF GUARANTY OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOUR USE OF THE INFORMATION CONTAINED HEREIN IS AT YOUR OWN RISK. ALL INFORMATION PROVIDED HEREIN IS BASED ON BROCADE'S CURRENT KNOWLEDGE AND UNDERSTANDING OF THE VULNERABILITY AND IMPACT TO BROCADE HARDWARE AND SOFTWARE PRODUCTS. BROCADE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.