|Category:||Debian Local Security Checks|
|Title:||Debian LTS Advisory ([SECURITY] [DLA 1556-1] paramiko security update)|
|Summary:||CVE-2018-1000805;Fix to prevent malicious clients to trick the Paramiko server into;thinking an unauthenticated client is authenticated.;;CVE-2018-7750;Fix check whether authentication is completed before processing;other requests. A customized SSH client can simply skip the;authentication step.|
Fix to prevent malicious clients to trick the Paramiko server into
thinking an unauthenticated client is authenticated.
Fix check whether authentication is completed before processing
other requests. A customized SSH client can simply skip the
paramiko on Debian Linux
For Debian 8 'Jessie', these problems have been fixed in version
We recommend that you upgrade your paramiko packages.
Common Vulnerability Exposure (CVE) ID: CVE-2018-7750|
RedHat Security Advisories: RHSA-2018:0591
RedHat Security Advisories: RHSA-2018:0646
RedHat Security Advisories: RHSA-2018:1124
RedHat Security Advisories: RHSA-2018:1125
RedHat Security Advisories: RHSA-2018:1213
RedHat Security Advisories: RHSA-2018:1274
RedHat Security Advisories: RHSA-2018:1328
RedHat Security Advisories: RHSA-2018:1525
RedHat Security Advisories: RHSA-2018:1972
BugTraq ID: 103713
|Copyright||Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.