First published: Wed Oct 17 2018(Updated: )
Peter Winter-Smith discovered that libssh incorrectly handled authentication when being used as a server. A remote attacker could use this issue to bypass authentication without any credentials.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssh-4 | <0.8.0~20170825.94fa1e38-1ubuntu0.1 | 0.8.0~20170825.94fa1e38-1ubuntu0.1 |
=18.04 | ||
All of | ||
ubuntu/libssh-4 | <0.6.3-4.3ubuntu0.1 | 0.6.3-4.3ubuntu0.1 |
=16.04 | ||
All of | ||
ubuntu/libssh-4 | <0.6.1-0ubuntu3.4 | 0.6.1-0ubuntu3.4 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this libssh vulnerability is USN-3795-1.
The severity of USN-3795-1 is not specified in the provided information.
Ubuntu 18.04 with libssh version up to 0.8.0~20170825.94fa1e38-1ubuntu0.1 is affected by this libssh vulnerability.
To fix the libssh vulnerability on Ubuntu 16.04, update libssh-4 package to version 0.6.3-4.3ubuntu0.1 or higher.
You can find more information about the libssh vulnerability at the following URLs: [CVE-2018-10933](https://ubuntu.com/security/CVE-2018-10933), [USN-3795-2](https://ubuntu.com/security/notices/USN-3795-2), [Launchpad](https://launchpad.net/ubuntu/+source/libssh/0.8.0~20170825.94fa1e38-1ubuntu0.1)