Red Hat Bugzilla – Bug 1614973
CVE-2018-10933 libssh: Authentication Bypass due to improper message callbacks implementation
Last modified: 2018-11-12 03:31:27 EST
A flaw was found in libSSH which can enable a client to bypass the authentication process and set the internal state machine maintained by the library to authenticated, enabling the (otherwise prohibited) creation of channels.
Name: the libssh team
Upstream: Peter Winter-Smith (NCC Group)
Created libssh tracking bugs for this issue:
Affects: fedora-all [bug 1639925]
This vulnerability affects libssh shipped in Red Hat Enterprise Linux 7 Extras. No libssh packages are included in Red Hat Enterprise Linux 6 and earlier. This issue does not affect libssh2 or openssh.
This issue can only be affect applications that use libssh to implement an SSH server; SSH client functionality is not affected. No packages in Red Hat products use libssh to implement an SSH server. Therefore, no package from Red Hat that uses the libssh library is affected by this flaw.
The libssh library is available for customer or third party code to use. Such code that is linked against libssh and uses the `ssh_bind*` functions may be affected by this flaw.