Summary: The FreeBSD Project has issued security updates to fix a critical vulnerability in OpenSSH (CVE-2024-7589) that could allow attackers to execute arbitrary code remotely with elevated privileges. This flaw, which has a CVSS score of 7.4, stems from a race condition in the sshd(8) signal handler that could be exploited by unauthenticated users.
Threat Actor: Unknown | unknown
Victim: FreeBSD users | FreeBSD users
Key Point :
- Vulnerability CVE-2024-7589 allows for remote code execution due to a race condition in the sshd(8) signal handler.
- The flaw is linked to the integration of blacklistd in OpenSSH within FreeBSD.
- Users are advised to update to a supported version of FreeBSD and restart sshd to mitigate risks.
- Setting LoginGraceTime to 0 can temporarily resolve the issue but increases vulnerability to denial-of-service attacks.

The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH that attackers could potentially exploit to execute arbitrary code remotely with elevated privileges.
The vulnerability, tracked as CVE-2024-7589, carries a CVSS score of 7.4 out of a maximum of 10.0, indicating high severity.
“A signal handler in sshd(8) may call a logging function that is not async-signal-safe,” according to an advisory released last week.

“The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)’s privileged code, which is not sandboxed and runs with full root privileges.”
OpenSSH is an implementation of the secure shell (SSH) protocol suite, providing encrypted and authenticated transport for a variety of services, including remote shell access.
CVE-2024-7589 has been described as “another instance” of a problem that’s referred to as regreSSHion (CVE-2024-6387), which came to light early last month.
“The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD,” the project maintainers said.
“As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root.”

Users of FreeBSD are strongly advised to update to a supported version and restart sshd to mitigate potential threats.
In cases where sshd(8) cannot be updated, the race condition issue can be resolved by setting LoginGraceTime to 0 in /etc/ssh/sshd_config and restarting sshd(8). While this change makes the daemon vulnerable to a denial-of-service, it safeguards it against remote code execution.
Source: https://thehackernews.com/2024/08/freebsd-releases-urgent-patch-for-high.html