Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:3347 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3406 | third party advisory vendor advisory |
https://github.com/paramiko/paramiko/issues/1283 | third party advisory patch |
https://usn.ubuntu.com/3796-3/ | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3505 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html | third party advisory mailing list |
https://access.redhat.com/errata/RHBA-2018:3497 | third party advisory vendor advisory |
https://usn.ubuntu.com/3796-2/ | third party advisory vendor advisory |
https://usn.ubuntu.com/3796-1/ | third party advisory vendor advisory |
https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt | broken link |
https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html | third party advisory mailing list |