Response to OpenSSH Vulnerabilities on RSA Authentication Manager 8.8 - CVE-2023-51385, CVE-2023-51767, CVE-2023-51384
10 months ago
Article Number
000073258
Applies To

OpenSSH Vulnerabilities on RSA Authentication Manager 8.8 - CVE-2023-51385, CVE-2023-51767, CVE-2023-51384

CVE Identifier(s)
CVE-2023-51385, CVE-2023-51767, CVE-2023-51384
Article Summary

1. OpenSSH OS Command Injection Vulnerability (CVE-2023-51385)

CVE-2023-51385
NVD Base Score: 6.5
SUSE Base Score: 6.5
 
Description:
In OpenSSH, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations.
 
Affected Versions:
OpenSSH versions prior to 9.6

2. OpenSSH Authentication Bypass Vulnerability (CVE-2023-51767)

 
CVE-2023-51767
NVD Base score: 7.0
SUSE Base score: 4.7
 
Description:
In OpenSSH, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit.
 
Affected Versions:
OpenSSH up to version 9.6
  

3. OpenSSH Incomplete Constrains Sensitive Information Disclosure Vulnerability (CVE-2023-51384)

CVE-2023-51384
NVD Base Score: 5.5
SUSE Base Score: 4.4
 
In ssh-agent in OpenSSH, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
 
Affected Versions:
OpenSSH versions prior to 9.6
 

Alert Impact
Not Applicable
Alert Impact Explanation

As per SUSE, 

CVE-2023-51385 - Fixed, released equivalent patch is already available in the system 

rsaadmin@bham:~> rpm -qa --changelog |grep -i CVE-2023-51385
- Added openssh-cve-2023-51385.patch (bsc#1218215, CVE-2023-51385).
- Added openssh-cve-2023-51385.patch (bsc#1218215, CVE-2023-51385).
- Added openssh-cve-2023-51385.patch (bsc#1218215, CVE-2023-51385).
- Added openssh-cve-2023-51385.patch (bsc#1218215, CVE-2023-51385).

 

CVE-2023-51767 - Wont Fix 

"This vulnerability is exploitable only in specific lab type environment. They are harder to exploit and would require special configuration cases to be exploited anyways. In this case the attack relies on code changes to OpenSSH itself." 

Note regarding this CVE from the openssh maintainers

> CVE-2023-51767
>
> Upstream openssh maintainers dispute the likelihood of this bug as it was
> tested against a modified ssh. Quote from Damien Miller - "achieving the
> timing required to successfully exploit is close to impossible in the real
> world."

 

CVE-2023-51384 - Not impacted 

The destination constraints for PKCS11 modules have only been added in 9.3p1, and have not been backported by SUSE to older versions. So the security vulnerability does not impact older versions, as it does not offer this security constraint.


Note: the feature was only added in recent openssh versions, the security problem does not apply to earlier versions than 9.3p1

The OpenSSH version on RSA Authentication Manager 8.8 is OpenSSH_8.4p1

rsaadmin@bham:~> ssh -V
OpenSSH_8.4p1, OpenSSL 1.1.1l-fips  24 Aug 2021 SUSE release 150400.7.75.1

 
 
Resolution

RSA Authentication Manager 8.8 is not impacted by OpenSSH Vulnerabilities

Disclaimer
Read and use the information in this RSA Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact RSA Technical Support at 1-800-995-5095. RSA Security LLC and its affiliates distribute RSA Security Advisories in order to bring to the attention of users of the affected RSA products, important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided 'as is' without warranty of any kind. RSA disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall RSA, its affiliates, or suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA, its affiliates, or suppliers have been advised of the possibility of such damages. Some jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.