Possibly linux@lemmy.zip to Linux@lemmy.mlEnglish · 10 个月前XZ backdoor in a nutshelllemmy.zipimagemessage-square8fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1imageXZ backdoor in a nutshelllemmy.zipPossibly linux@lemmy.zip to Linux@lemmy.mlEnglish · 10 个月前message-square8fedilink
minus-squareAatube@kbin.melroy.orglinkfedilinkarrow-up0·10 个月前It allows a patched SSH client to bypass SSH authentication and gain access to a compromised computer
minus-squared3Xt3r@lemmy.nzMlinkfedilinkarrow-up1·edit-210 个月前From what I’ve heard so far, it’s NOT an authentication bypass, but a gated remote code execution. There’s some discussion on that here: https://bsky.app/profile/filippo.abyssdomain.expert/post/3kowjkx2njy2b But it would be nice to have a similar digram like OP’s to understand how exactly it does the RCE and implements the SSH backdoor. If we understand how, maybe we can take measures to prevent similar exploits in the future.
It allows a patched SSH client to bypass SSH authentication and gain access to a compromised computer
From what I’ve heard so far, it’s NOT an authentication bypass, but a gated remote code execution.
There’s some discussion on that here: https://bsky.app/profile/filippo.abyssdomain.expert/post/3kowjkx2njy2b
But it would be nice to have a similar digram like OP’s to understand how exactly it does the RCE and implements the SSH backdoor. If we understand how, maybe we can take measures to prevent similar exploits in the future.