{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-25136","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-02T11:18:35.552Z","dateReserved":"2023-02-03T00:00:00.000Z","datePublished":"2023-02-03T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-07-20T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states \"remote code execution is theoretically possible.\""}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig"},{"url":"https://www.openwall.com/lists/oss-security/2023/02/02/2"},{"url":"https://bugzilla.mindrot.org/show_bug.cgi?id=3522"},{"url":"https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946"},{"url":"https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/"},{"url":"https://news.ycombinator.com/item?id=34711565"},{"name":"[oss-security] 20230213 Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/02/13/1"},{"name":"[oss-security] 20230222 Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/02/22/1"},{"name":"[oss-security] 20230222 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/02/22/2"},{"name":"[oss-security] 20230223 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/02/23/3"},{"name":"[oss-security] 20230306 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/03/06/1"},{"name":"[oss-security] 20230309 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/03/09/2"},{"url":"https://security.netapp.com/advisory/ntap-20230309-0003/"},{"name":"FEDORA-2023-1176c8b10c","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/"},{"name":"FEDORA-2023-123647648e","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGAUIXJ3TEKCRKVWFQ6GDAGQFTIIGQQP/"},{"name":"GLSA-202307-01","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202307-01"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T11:18:35.552Z"},"title":"CVE Program Container","references":[{"url":"https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig","tags":["x_transferred"]},{"url":"https://www.openwall.com/lists/oss-security/2023/02/02/2","tags":["x_transferred"]},{"url":"https://bugzilla.mindrot.org/show_bug.cgi?id=3522","tags":["x_transferred"]},{"url":"https://github.com/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946","tags":["x_transferred"]},{"url":"https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/","tags":["x_transferred"]},{"url":"https://news.ycombinator.com/item?id=34711565","tags":["x_transferred"]},{"name":"[oss-security] 20230213 Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/02/13/1"},{"name":"[oss-security] 20230222 Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/02/22/1"},{"name":"[oss-security] 20230222 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/02/22/2"},{"name":"[oss-security] 20230223 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/02/23/3"},{"name":"[oss-security] 20230306 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/03/06/1"},{"name":"[oss-security] 20230309 Re: Re: double-free vulnerability in OpenSSH server 9.1 (CVE-2023-25136)","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/03/09/2"},{"url":"https://security.netapp.com/advisory/ntap-20230309-0003/","tags":["x_transferred"]},{"name":"FEDORA-2023-1176c8b10c","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/"},{"name":"FEDORA-2023-123647648e","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGAUIXJ3TEKCRKVWFQ6GDAGQFTIIGQQP/"},{"name":"GLSA-202307-01","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202307-01"}]}]}}