Security Vulnerability: openssh remote code execution via SSH agent forwarding (CVE-2023-38408)
This document (000021143) is provided subject to the disclaimer at the end of this document.
Environment
https://www.suse.com/security/cve/CVE-2023-38408.html
Situation
Attackers must be able to access a host via ssh to escalate privileges on that host by exploiting a flaw in the pkcs11 module loading of the ssh agent. As the pkcs11 agent helper allowed loading of system dynamic libraries, certain
loading patterns and problems in system libraries could be used to gain code execution as the pkcs11 helper.
Resolution
Status
Additional Information
In case PKCS11 smartcard are not used for SSH agent support, remove /usr/lib/ssh/ssh-pkcs11-helper from the system until maintenance updates have been released.
Additional references:
https://www.suse.com/security/cve/CVE-2023-38408.html
https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent
Disclaimer
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000021143
- Creation Date: 20-Jul-2023
- Modified Date:20-Jul-2023
-
- SUSE Linux Enterprise Desktop
- SUSE Linux Enterprise Server
- SUSE Linux Enterprise Server for SAP Applications
- SUSE Manager Server
- SUSE Linux Enterprise Micro
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com