From ad599d94dc4e8f19be4a2d04053b3b328db22497 Mon Sep 17 00:00:00 2001 From: Acrono <51956758+acrono@users.noreply.github.com> Date: Mon, 1 Jul 2024 15:25:01 +0300 Subject: [PATCH] Update README.md --- README.md | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 8beceec..08790d3 100644 --- a/README.md +++ b/README.md @@ -1,2 +1,16 @@ # cve-2024-6387-poc -a signal handler race condition in OpenSSH's server (sshd) +> a signal handler race condition in OpenSSH's server (sshd) + +- 7etsuo + +## Description + +An exploit for CVE-2024-6387, targeting a signal handler race condition in OpenSSH's server (`sshd`) on glibc-based Linux systems. The vulnerability allows for remote code execution as root due to async-signal-unsafe functions being called in the `SIGALRM` handler. + +## Exploit Details + +### Vulnerability Summary + +The exploit targets the `SIGALRM` handler race condition in OpenSSH's `sshd`: +- **Affected Versions**: OpenSSH 8.5p1 to 9.8p1. +- **Exploit**: Remote code execution as root due to the vulnerable `SIGALRM` handler calling async-signal-unsafe functions.