CVE-2018-10933

Name
CVE-2018-10933
Description
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.libssh.org/security/advisories/CVE-2018-10933.txt
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933
Third Party Advisory https://www.debian.org/security/2018/dsa-4322
Third Party Advisory https://usn.ubuntu.com/3795-1/
Mailing List https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html
Exploit https://www.exploit-db.com/exploits/45638/
Third Party Advisory http://www.securityfocus.com/bid/105677
Third Party Advisory https://usn.ubuntu.com/3795-2/
Third Party Advisory https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016
Patch https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20190118-0002/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:* libssh >= 0.8.0 < 0.8.4
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:* libssh >= 0.6.0 < 0.7.6

Vulnerable and fixed packages

Source package Branch Version Maintainer Status