CVE-2023-51767: OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for...
7
Basic Information
Technical Details
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description (CVE-2023-51767) and the referenced source code links directly point to the 'mm_answer_authpassword' function in 'monitor.c' as the location of the vulnerable 'authenticated' integer. The core issue is that a bit flip in this integer, which stores the result of a password check, can change a failed authentication attempt into a successful one from the perspective of the part of OpenSSH that acts on this result. The provided commit information was for a version bump and did not contain a direct fix, and further investigation into OpenSSH's bug tracker confirmed they consider this a platform-level mitigation responsibility. The analysis of the 'monitor.c' source code confirms the role of 'mm_answer_authpassword' and the 'authenticated' variable as described in the CVE. The function 'auth_password' is also relevant as it performs the actual password check, the result of which is stored in the vulnerable 'authenticated' variable within 'mm_answer_authpassword'..