CVE-2023-51767
Published: December 24, 2023Last modified: July 22, 2025
Description
OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7 |
| Attack Vector | LOCAL |
| Attack complexity | HIGH |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | HIGH |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | openssh | Will not fix (9.1_p1-r3) |
| Stream | openssh | Will not fix (9.3_p1-r7) | |
| Hardened Containers | 23 LTS | openssh | Will not fix (9.1_p1-r3) |
| Stream | openssh | Will not fix (9.3_p1-r7) |
References
- http://www.openwall.com/lists/oss-security/2025/09/22/1
- http://www.openwall.com/lists/oss-security/2025/09/22/2
- http://www.openwall.com/lists/oss-security/2025/09/23/1
- http://www.openwall.com/lists/oss-security/2025/09/23/3
- http://www.openwall.com/lists/oss-security/2025/09/23/4
- http://www.openwall.com/lists/oss-security/2025/09/23/5
- http://www.openwall.com/lists/oss-security/2025/09/24/4
- http://www.openwall.com/lists/oss-security/2025/09/24/7
- http://www.openwall.com/lists/oss-security/2025/09/25/2
- http://www.openwall.com/lists/oss-security/2025/09/25/6
- http://www.openwall.com/lists/oss-security/2025/09/26/2
- http://www.openwall.com/lists/oss-security/2025/09/26/4
- http://www.openwall.com/lists/oss-security/2025/09/27/1
- http://www.openwall.com/lists/oss-security/2025/09/27/2
- http://www.openwall.com/lists/oss-security/2025/09/27/3
- http://www.openwall.com/lists/oss-security/2025/09/27/4
- http://www.openwall.com/lists/oss-security/2025/09/27/5
- http://www.openwall.com/lists/oss-security/2025/09/27/6
- http://www.openwall.com/lists/oss-security/2025/09/27/7
- http://www.openwall.com/lists/oss-security/2025/09/28/7
- http://www.openwall.com/lists/oss-security/2025/09/29/1
- http://www.openwall.com/lists/oss-security/2025/09/29/4
- http://www.openwall.com/lists/oss-security/2025/09/29/5
- http://www.openwall.com/lists/oss-security/2025/09/29/6
- http://www.openwall.com/lists/oss-security/2025/10/01/1
- http://www.openwall.com/lists/oss-security/2025/10/01/2
- https://access.redhat.com/security/cve/CVE-2023-51767
- https://arxiv.org/abs/2309.02545
- https://bugzilla.redhat.com/show_bug.cgi?id=2255850
- https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77
- https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878
- https://security.netapp.com/advisory/ntap-20240125-0006/
- https://ubuntu.com/security/CVE-2023-51767
- https://www.openwall.com/lists/oss-security/2025/09/22/1