CVE-2018-10933

A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
References
Link Resource
http://www.securityfocus.com/bid/105677 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html Mailing List Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016 Third Party Advisory
https://security.netapp.com/advisory/ntap-20190118-0002/ Third Party Advisory
https://usn.ubuntu.com/3795-1/ Third Party Advisory
https://usn.ubuntu.com/3795-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4322 Third Party Advisory
https://www.exploit-db.com/exploits/45638/ Exploit Third Party Advisory VDB Entry
https://www.libssh.org/security/advisories/CVE-2018-10933.txt Vendor Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch Third Party Advisory
http://www.securityfocus.com/bid/105677 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html Mailing List Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016 Third Party Advisory
https://security.netapp.com/advisory/ntap-20190118-0002/ Third Party Advisory
https://usn.ubuntu.com/3795-1/ Third Party Advisory
https://usn.ubuntu.com/3795-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4322 Third Party Advisory
https://www.exploit-db.com/exploits/45638/ Exploit Third Party Advisory VDB Entry
https://www.libssh.org/security/advisories/CVE-2018-10933.txt Vendor Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*
cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/105677 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105677 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933 - Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html - Mailing List, Third Party Advisory
References () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016 - Third Party Advisory () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20190118-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20190118-0002/ - Third Party Advisory
References () https://usn.ubuntu.com/3795-1/ - Third Party Advisory () https://usn.ubuntu.com/3795-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3795-2/ - Third Party Advisory () https://usn.ubuntu.com/3795-2/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4322 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4322 - Third Party Advisory
References () https://www.exploit-db.com/exploits/45638/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45638/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.libssh.org/security/advisories/CVE-2018-10933.txt - Vendor Advisory () https://www.libssh.org/security/advisories/CVE-2018-10933.txt - Vendor Advisory
References () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - Patch, Third Party Advisory () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - Patch, Third Party Advisory

Information

Published : 2018-10-17 12:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-10933

Mitre link : CVE-2018-10933

CVE.ORG link : CVE-2018-10933


JSON object : View

Products Affected

libssh

  • libssh

redhat

  • enterprise_linux

netapp

  • oncommand_unified_manager
  • storage_automation_store
  • snapcenter
  • oncommand_workflow_automation

canonical

  • ubuntu_linux

oracle

  • mysql_workbench

debian

  • debian_linux
CWE
CWE-592

DEPRECATED: Authentication Bypass Issues

CWE-287

Improper Authentication