Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-25136 PoC — OpenSSH 资源管理错误漏洞

Source
Associated Vulnerability
Title:OpenSSH 资源管理错误漏洞 (CVE-2023-25136)
Description:OpenSSH(OpenBSD Secure Shell)是加拿大OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 存在资源管理错误漏洞,该漏洞源于options.kex_algorithms 处理期间引入了双重释放漏洞。
Readme
# CVE-2023-25136 Proof-of-Concept

### Overview

This is a DoS Proof-of-Concept of OpenSSH 9.1p1 Double-Free Vulnerability CVE-2023-25136.  
It will trigger the double-free and cause an abort crash.  
For a comprehensive understanding, check out the accompanying [blog post](https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/) for in-depth details.

### Dependencies

* Python 3.6+
* `paramiko` Python Library

### Usage

1. Verify `paramiko` is installed:
```
pip install paramiko
```

2. Change the `VICTIM_IP` to match your vulnerable OpenSSH Server IP.  

3. Run the PoC:
```
python cve-2023-25136.py
```
File Snapshot

[4.0K] /data/pocs/fea67398b260431f6c902963c43af9369b104a24 ├── [ 283] cve-2023-25136.py ├── [ 11K] LICENSE └── [ 681] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.