Whilst not likely to be so impactful, variations could make one more prevalent over the other.
Further analysis of the OpenSSH regreSSHion vulnerability has led to the identification of a related bug.
Tracked as CVE-2024-6409, SecurityWeek reports that it poses a "lower" immediate impact due to the issues being present in the privsep child process with fewer privileges.
Openwall founder Alexander Peslyak, who discovered and reported the vulnerability, noted that variations in exploitability and potential lack of remediations may make one more prevalent over the other. "It may also be possible to construct an exploit that would work against either vulnerability probabilistically, which could decrease attack duration or increase success rate," he said.
Discovered by Qualys researchers last month, CVE-2024-6387 allows unauthenticated remote code execution as root on glibc-based Linux systems.
Written by
Dan Raywood
Senior Editor
SC Media UK
Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.
Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.