CVE-2024-39894
Published: July 4, 2024Last modified: June 5, 2025
Description
OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack Vector | NETWORK |
Attack complexity | HIGH |
Privileges required | NONE |
User interaction | REQUIRED |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | Stream | openssh | Unknown (9.5_p1-r0) |
References
- http://www.openwall.com/lists/oss-security/2024/07/03/6
- http://www.openwall.com/lists/oss-security/2024/07/23/4
- http://www.openwall.com/lists/oss-security/2024/07/23/6
- http://www.openwall.com/lists/oss-security/2024/07/28/3
- https://crzphil.github.io/posts/ssh-obfuscation-bypass/
- https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html
- https://news.ycombinator.com/item?id=41508530
- https://security.netapp.com/advisory/ntap-20240712-0004/
- https://www.freebsd.org/security/advisories/FreeBSD-SA-25:01.openssh.asc
- https://www.openssh.com/txt/release-9.8
- https://www.openwall.com/lists/oss-security/2024/07/02/1