oss-sec mailing list archives

Re: CVE-2023-51767: a bogus CVE in OpenSSH


From: Damien Miller <djm () mindrot org>
Date: Wed, 24 Sep 2025 15:32:35 +1000 (AEST)

On Wed, 24 Sep 2025, Adiletta, Andrew wrote:

Hi Alexander and Team,

Thank your for the interest in our paper, and we appreciate all the
feedback. We wanted to address two points - the OpenSSH CVE, and the
comments from the OpenSSH community about the practicality of the attack. 

On CVE-2023-51767 (OpenSSH), we did not submit this CVE. Our team
coordinates with vendors / software mantainers before submitting CVEs to
make sure there is agreement. The CVE description does seem
mischaracterized, as this is not a zero-click type vulnability as the CVE
suggests, and we would not oppose either a revision or other action. We did
work with Todd Miller on a SUDO CVE (CVE-2023-42465), of which we worked
with him to release a patch. 

However, on the practicality, I do believe that we did not mischaracterize
the attack in the paper, and as Alexander concisely mentioned, we are really
trying to emphasize the issues with simple 0/1 flag logic that leads down to
sensitive execution flows. 

Sure, but my criticism at the time was that your paper claimed in
the abstract to have successfully attacked OpenSSH to bypass
authentication but what was actually attacked was a modified version
of sshd run in a highly unrealistic and synchronised setting.

IMO this context matters and doesn't detract from your findings.

-d

Current thread: