Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <c5d66517-f422-1fe7-03a0-d79cf4af1fbf@mindrot.org>
Date: Wed, 24 Sep 2025 15:32:35 +1000 (AEST)
From: Damien Miller <djm@...drot.org>
To: "Adiletta, Andrew" <ajadiletta@....edu>
cc: Solar Designer <solar@...nwall.com>,
        "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>,
        "openssh@...nssh.com" <openssh@...nssh.com>,
        "Tol, Caner" <mtol@....edu>, "Sunar, Berk" <sunar@....edu>,
        "Doroz, Yarkin" <ydoroz@....edu>,
        "Todd C. Miller" <Todd.Miller@...rtesan.com>,
        "pgut001@...auckland.ac.nz" <pgut001@...auckland.ac.nz>
Subject: Re: CVE-2023-51767: a bogus CVE in OpenSSH

On Wed, 24 Sep 2025, Adiletta, Andrew wrote:

> Hi Alexander and Team,
> 
> Thank your for the interest in our paper, and we appreciate all the
> feedback. We wanted to address two points - the OpenSSH CVE, and the
> comments from the OpenSSH community about the practicality of the attack. 
> 
> On CVE-2023-51767 (OpenSSH), we did not submit this CVE. Our team
> coordinates with vendors / software mantainers before submitting CVEs to
> make sure there is agreement. The CVE description does seem
> mischaracterized, as this is not a zero-click type vulnability as the CVE
> suggests, and we would not oppose either a revision or other action. We did
> work with Todd Miller on a SUDO CVE (CVE-2023-42465), of which we worked
> with him to release a patch. 
> 
> However, on the practicality, I do believe that we did not mischaracterize
> the attack in the paper, and as Alexander concisely mentioned, we are really
> trying to emphasize the issues with simple 0/1 flag logic that leads down to
> sensitive execution flows. 

Sure, but my criticism at the time was that your paper claimed in
the abstract to have successfully attacked OpenSSH to bypass
authentication but what was actually attacked was a modified version
of sshd run in a highly unrealistic and synchronised setting.

IMO this context matters and doesn't detract from your findings.

-d

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.