Miggo Logo

CVE-2023-51767: OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for...

7

CVSS Score
3.1

Basic Information

EPSS Score
0.01059%
CWE
-
Published
12/24/2023
Updated
3/7/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description (CVE-2023-51767) and the referenced source code links directly point to the 'mm_answer_authpassword' function in 'monitor.c' as the location of the vulnerable 'authenticated' integer. The core issue is that a bit flip in this integer, which stores the result of a password check, can change a failed authentication attempt into a successful one from the perspective of the part of OpenSSH that acts on this result. The provided commit information was for a version bump and did not contain a direct fix, and further investigation into OpenSSH's bug tracker confirmed they consider this a platform-level mitigation responsibility. The analysis of the 'monitor.c' source code confirms the role of 'mm_answer_authpassword' and the 'authenticated' variable as described in the CVE. The function 'auth_password' is also relevant as it performs the actual password check, the result of which is stored in the vulnerable 'authenticated' variable within 'mm_answer_authpassword'..

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Op*nSS* t*rou** *.*, w**n *ommon typ*s o* *R*M *r* us**, mi**t *llow row **mm*r *tt**ks (*or *ut**nti**tion *yp*ss) ****us* t** int***r v*lu* o* *ut**nti**t** in mm_*nsw*r_*ut*p*sswor* *o*s not r*sist *lips o* * sin*l* *it. NOT*: t*is is *ppli***l* t

Reasoning

T** vuln*r**ility **s*ription (*V*-****-*****) *n* t** r***r*n*** sour** *o** links *ir**tly point to t** 'mm_*nsw*r_*ut*p*sswor*' *un*tion in 'monitor.*' *s t** lo**tion o* t** vuln*r**l* '*ut**nti**t**' int***r. T** *or* issu* is t**t * *it *lip in