ALT-PU-2018-2552-1
Closed vulnerabilities
BDU:2018-01221
Уязвимость механизма аутентификации серверной части библиотеки libssh, позволяющая нарушителю обойти процедуру аутентификации
Modified: 2025-04-12
CVE-2014-8132
Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
- http://advisories.mageia.org/MGASA-2015-0014.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147367.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147452.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147464.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00007.html
- http://secunia.com/advisories/60838
- http://www.debian.org/security/2016/dsa-3488
- http://www.libssh.org/2014/12/19/libssh-0-6-4-security-and-bugfix-release/
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:020
- http://www.ubuntu.com/usn/USN-2478-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1158089
- https://security.gentoo.org/glsa/201606-12
- http://advisories.mageia.org/MGASA-2015-0014.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147367.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147452.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147464.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00007.html
- http://secunia.com/advisories/60838
- http://www.debian.org/security/2016/dsa-3488
- http://www.libssh.org/2014/12/19/libssh-0-6-4-security-and-bugfix-release/
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:020
- http://www.ubuntu.com/usn/USN-2478-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1158089
- https://security.gentoo.org/glsa/201606-12
Modified: 2025-04-12
CVE-2015-3146
The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html
- http://www.debian.org/security/2016/dsa-3488
- http://www.ubuntu.com/usn/USN-2912-1
- https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5&id=94f6955fbaee6fda9385a23e505497efe21f5b4f
- https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/
- https://www.libssh.org/security/advisories/CVE-2015-3146.txt
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161802.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158013.html
- http://www.debian.org/security/2016/dsa-3488
- http://www.ubuntu.com/usn/USN-2912-1
- https://git.libssh.org/projects/libssh.git/commit/?h=libssh-0.6.5&id=94f6955fbaee6fda9385a23e505497efe21f5b4f
- https://www.libssh.org/2015/04/30/libssh-0-6-5-security-and-bugfix-release/
- https://www.libssh.org/security/advisories/CVE-2015-3146.txt
Modified: 2025-04-12
CVE-2016-0739
libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178058.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178822.html
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00111.html
- http://rhn.redhat.com/errata/RHSA-2016-0566.html
- http://www.debian.org/security/2016/dsa-3488
- http://www.ubuntu.com/usn/USN-2912-1
- https://puppet.com/security/cve/CVE-2016-0739
- https://security.gentoo.org/glsa/201606-12
- https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/
- https://www.libssh.org/security/advisories/CVE-2016-0739.txt
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178058.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178822.html
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00111.html
- http://rhn.redhat.com/errata/RHSA-2016-0566.html
- http://www.debian.org/security/2016/dsa-3488
- http://www.ubuntu.com/usn/USN-2912-1
- https://puppet.com/security/cve/CVE-2016-0739
- https://security.gentoo.org/glsa/201606-12
- https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/
- https://www.libssh.org/security/advisories/CVE-2016-0739.txt
Modified: 2024-11-21
CVE-2018-10933
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
- http://www.securityfocus.com/bid/105677
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933
- https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://usn.ubuntu.com/3795-1/
- https://usn.ubuntu.com/3795-2/
- https://www.debian.org/security/2018/dsa-4322
- https://www.exploit-db.com/exploits/45638/
- https://www.libssh.org/security/advisories/CVE-2018-10933.txt
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- http://www.securityfocus.com/bid/105677
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933
- https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://usn.ubuntu.com/3795-1/
- https://usn.ubuntu.com/3795-2/
- https://www.debian.org/security/2018/dsa-4322
- https://www.exploit-db.com/exploits/45638/
- https://www.libssh.org/security/advisories/CVE-2018-10933.txt
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html