ALT-PU-2018-2563-1
Closed vulnerabilities
Published: 2018-10-17
BDU:2018-01221
Уязвимость механизма аутентификации серверной части библиотеки libssh, позволяющая нарушителю обойти процедуру аутентификации
Severity: CRITICAL (9.8)
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: CRITICAL (10.0)
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
References:
Published: 2016-04-13
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2016-0739
libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
Severity: MEDIUM (4.3)
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Severity: MEDIUM (5.9)
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178058.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178822.html
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00111.html
- http://rhn.redhat.com/errata/RHSA-2016-0566.html
- http://www.debian.org/security/2016/dsa-3488
- http://www.ubuntu.com/usn/USN-2912-1
- https://puppet.com/security/cve/CVE-2016-0739
- https://security.gentoo.org/glsa/201606-12
- https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/
- https://www.libssh.org/security/advisories/CVE-2016-0739.txt
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178058.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178822.html
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00111.html
- http://rhn.redhat.com/errata/RHSA-2016-0566.html
- http://www.debian.org/security/2016/dsa-3488
- http://www.ubuntu.com/usn/USN-2912-1
- https://puppet.com/security/cve/CVE-2016-0739
- https://security.gentoo.org/glsa/201606-12
- https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/
- https://www.libssh.org/security/advisories/CVE-2016-0739.txt
Published: 2018-10-17
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2018-10933
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
Severity: MEDIUM (6.4)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N
Severity: CRITICAL (9.1)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
References:
- http://www.securityfocus.com/bid/105677
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933
- https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://usn.ubuntu.com/3795-1/
- https://usn.ubuntu.com/3795-2/
- https://www.debian.org/security/2018/dsa-4322
- https://www.exploit-db.com/exploits/45638/
- https://www.libssh.org/security/advisories/CVE-2018-10933.txt
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- http://www.securityfocus.com/bid/105677
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933
- https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://usn.ubuntu.com/3795-1/
- https://usn.ubuntu.com/3795-2/
- https://www.debian.org/security/2018/dsa-4322
- https://www.exploit-db.com/exploits/45638/
- https://www.libssh.org/security/advisories/CVE-2018-10933.txt
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html