|Title:||libssh Server 'CVE-2018-10933' Authentication Bypass|
|Summary:||The remote SSH server is using libssh which is prone to an authentication bypass vulnerability.|
The remote SSH server is using libssh which is prone to an authentication bypass vulnerability.
By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the
SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication the server is authentciating
users without any credentials.
NOTE: Some server implementations using libssh (e.g. Github Enterprise) are not affected by this issue.
An attacker could successfully authentciate without any credentials.
libssh versions starting from 0.6 and prior to 0.7.6/0.8.4.
Update to libssh version 0.7.6, 0.8.4 or later.
Common Vulnerability Exposure (CVE) ID: CVE-2018-10933|
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.