CVE-2018-10933

A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
redhatCNA
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
libsshlibssh
0.6.0 ≤
𝑥
< 0.7.6
libsshlibssh
0.8.0 ≤
𝑥
< 0.8.4
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
18.10
debiandebian_linux
8.0
debiandebian_linux
9.0
redhatenterprise_linux
7.0
netapponcommand_unified_manager
7.3 ≤
netapponcommand_unified_manager
9.4 ≤
netapponcommand_workflow_automation
-
netappsnapcenter
-
netappstorage_automation_store
-
oraclemysql_workbench
𝑥
≤ 8.0.13
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libssh
bullseye (security)
0.9.8-0+deb11u1
fixed
bullseye
0.9.8-0+deb11u1
fixed
bookworm
0.10.6-0+deb12u1
fixed
bookworm (security)
0.10.6-0+deb12u1
fixed
sid
0.11.1-1
fixed
trixie
0.11.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libssh
cosmic
Fixed 0.8.1-1ubuntu0.1
released
bionic
Fixed 0.8.0~20170825.94fa1e38-1ubuntu0.1
released
xenial
Fixed 0.6.3-4.3ubuntu0.1
released
trusty
Fixed 0.6.1-0ubuntu3.4
released