Another Critical OpenSSH Vulnerability

preview_player
Показать описание
In this video I discuss the regreSSHion vulnerability CVE-2024-6387, how to mitigate it, and how vulnerabilities like this can be prevented in the future. Learn more about the bug below.

My merch is available at

₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿

Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436

Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV

Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079

Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
Рекомендации по теме
Комментарии
Автор

“And it’s already got a cute nickname, so you knows it’s a serious bug” facts lol

chashmal
Автор

Oh boy, UEFI buffer overflow and now this

hoot
Автор

A moment of silence for all the CIA, FBI and NSA employees who now have to put in longer hours over the summer days to find a new vulnerability😔

sergeantsugartm
Автор

That's the kinda title you wanna see just minutes after starting sshd

AderynCrow
Автор

My Debian machine is so old it's not affected 😂

pacifico
Автор

Thank god, I keep my SSH endpoints behind Wireguard interfaces. Look like my paranoia is yet again paying off.

b.bergeron
Автор

"...and its already got a cute nickname, so you know this is a really serious bug" - lmao, yeah

Ligands
Автор

The fact it is a recidivist regression highly increases the suspicion it is being (re)added on purpose by some malicious agent/entity...

tiagotiagot
Автор

Nice. Straight to the point, informative and a FAQ included. I love you.

meten
Автор

Oh no, time to patch my personal as well as my companies servers ASAP! Thank you so much for the informative, straight-to-the-point videos that you make. You are a real saint for all the admins and devs out there. Greetings from Germany :D
~ Shinney

ShinneyDev
Автор

Friendship ended with SSH now Telnet is my best friend

SIackware
Автор

i literally just set up openssh for a pihole yesterday you have got to be kidding me

himebito
Автор

Hm. So that’s why openssh had an update an hour ago

tpdblake
Автор

This problem is with Unix signals, not with C. So I bet Rust wouldn't have prevented it, unless they implemented some special handling of Unix signals. Working with those signals is a nightmare.

szaszm_
Автор

"the bugs are back" - dracula flow
lol

slobrat
Автор

One way to avoid this exploit is just to disable password authentication and login with certificates. This is the way in enterprise levels

marcusaurelius
Автор

Its so critical that nobody ever used this outside of a lab situation!!!!

SAK_-
Автор

In 2001 OpenBSD switched syslog to syslog-r, an async-signal-safer version of syslog, which SIGALRM calls, so you can get as far as SIGALRM, but it can't actually bonk syslog-r

also thanks for telling me. This affects Ubuntu and many instances of Docker that are out right now.
Btw this is going to end up unintentionally DDoSing people who use Windows and Putty

erwynnipegerwynnipeg
Автор

I did not know about this. Thank you for posting this because I immediately logged into my servers and updated them.

djc
Автор

Thank you Mental (giant) Man. You RoCk (but don't let that go to your head)

ovalwingnut