A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
This weakness has been deprecated because it covered redundant concepts already described in CWE-287.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://usn.ubuntu.com/3795-1/ | third party advisory vendor advisory |
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | third party advisory patch |
https://usn.ubuntu.com/3795-2/ | third party advisory vendor advisory |
https://www.debian.org/security/2018/dsa-4322 | third party advisory vendor advisory |
https://www.exploit-db.com/exploits/45638/ | third party advisory vdb entry exploit |
https://www.libssh.org/security/advisories/CVE-2018-10933.txt | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933 | third party advisory issue tracking |
http://www.securityfocus.com/bid/105677 | third party advisory vdb entry |
https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html | third party advisory mailing list |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016 | third party advisory |
https://security.netapp.com/advisory/ntap-20190118-0002/ | third party advisory |