CVE-2018-10933

Impact:
Important
Public Date:
2018-10-16
CWE:
CWE-592
Bugzilla:
1614973: CVE-2018-10933 libssh: Authentication Bypass due to improper message callbacks implementation
A vulnerability was found in libssh's server-side state machine. A malicious client could create channels without first performing authentication, resulting in unauthorized access.

Find out more about CVE-2018-10933 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This vulnerability affects libssh shipped in Red Hat Enterprise Linux 7 Extras. No libssh packages are included in Red Hat Enterprise Linux 6 and earlier. This issue does not affect libssh2 or openssh.

This issue can only be affect applications that use libssh to implement an SSH server; SSH client functionality is not affected. No packages in Red Hat products use libssh to implement an SSH server. Therefore, no package from Red Hat that uses the libssh library is affected by this flaw.

The libssh library is available for customer or third party code to use. Such code that is linked against libssh and uses the ssh_bind* functions may be affected by this flaw.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 9.1
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact None

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 libssh2 Not affected
Red Hat Enterprise Linux 7 libssh Affected
Red Hat Enterprise Linux 6 libssh2 Not affected

Acknowledgements

Red Hat would like to thank the libssh team for reporting this issue. Upstream acknowledges Peter Winter-Smith (NCC Group) as the original reporter.

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.