Help Center/ Cloud Container Engine/ Product Bulletin/ Vulnerability Notices/ Notice of OpenSSH Remote Code Execution Vulnerability (CVE-2024-6387)
Updated on 2024-11-11 GMT+08:00

Notice of OpenSSH Remote Code Execution Vulnerability (CVE-2024-6387)

OpenSSH is a secure network communication tool based on the SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks. In addition, OpenSSH provides a large number of secure tunneling capabilities, multiple authentication methods, and complex configuration options. It is a necessary tool for remote server management and secure data communication.

Description

Table 1 Vulnerability details

Type

CVE-ID

Severity

Discovered

Privilege escalation

CVE-2024-6387

Critical

2024-07-01

Impact

This vulnerability is caused by a signal handler race condition in OpenSSH's server (sshd). An unauthenticated attacker can exploit this vulnerability to execute arbitrary code as root on Linux.

Identification Method

  • Check the OS and OpenSSH versions of a node:
    • If the OS of a cluster node is EulerOS or CentOS, the OpenSSH is not affected by this vulnerability.
  • Run the following command to check whether the SSH port is used:
    netstat -tlnp|grep -w 22

    If the query result shows that the SSH port is listening, it specifies that the SSH access is enabled on the node.