[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
libssh 0.8.4 and 0.7.6 to address CVE-2018-10933 is out
[Thread Prev] | [Thread Next]
- Subject: libssh 0.8.4 and 0.7.6 to address CVE-2018-10933 is out
- From: Andreas Schneider <asn@xxxxxxxxxxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Tue, 16 Oct 2018 16:20:43 +0200
- To: libssh@xxxxxxxxxx
======================================================================= == Subject: Authentication bypass in server code == == CVE ID#: CVE-2018-10933 == == Versions: All versions of libssh 0.6 and later == == Summary: There is a vulnerability within the server code which == can enable a client to bypass the authentication == process and set the internal state machine maintained == by the library to authenticated, enabling the == (otherwise prohibited) creation of channels. == ======================================================================= =========== Description =========== libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authentciate without any credentials. The bug was discovered by Peter Winter-Smith of NCC Group. ================== Patch Availability ================== Patches addressing the issue have been posted to: https://www.libssh.org/ libssh version 0.8.4 and libssh 0.7.6 have been released to address this issue. ========== Workaround ========== There is no workaround for this issue. ======= Credits ======= The bug was discovered by Peter Winter-Smith of NCC Group. Patches are provided by the Anderson Toshiyuki Sasaki of Red Hat and the libssh team. ========================================================== == The libssh team ========================================================== https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release/ -- Andreas Schneider asn@xxxxxxxxxxxxxx GPG-ID: 8DFF53E18F2ABC8D8F3C92237EE0FC4DCC014E3D
Re: libssh 0.8.4 and 0.7.6 to address CVE-2018-10933 is out | Andreas Schneider <asn@xxxxxxxxxxxxxx> |