Investigation of OpenSSH vulnerability with Clarity LIMS
Published: July 30, 2024
Vulnerability CVE-2024-6387 was found to allow an unauthenticated remote code execution in OpenSSH’s server (sshd) that grants full root access. It affects the default configuration and does not require user interaction, posing a significant exploit risk.
The vulnerability affects OpenSSH version:
< 4.4p1 (unless the version is patched for CVE-2006-5051 and CVE-2008-4109)
>= 8.5p1
< 8.7p1
< 9.8p1
The affected OpenSSH versions reported in Vulnerability CVE-2024-6387 are not used for released ClarityLIMS version 6.2.0, 6.2.1 and 6.3.0:
ClarityLIMS version | Server OS | OpenSSH version |
---|---|---|
6.2, 6.2.1 | Oracle Linux 8.9 | 8.0p1 |
6.3 | Oracle Linux 8.10 | 8.0p1 |
References
PreviousSample Sheet Generation Issue and CLPA Issues When Samples Have Been Assigned QC Flag Prior to Entering StepsNextThird Party Software Information
Last updated