MGASA-2019-0043

Source
https://advisories.mageia.org/MGASA-2019-0043.html
Import Source
https://advisories.mageia.org/MGASA-2019-0043.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0043
Related
Published
2019-01-20T00:02:33Z
Modified
2019-01-19T23:34:57Z
Summary
Updated libssh packages fix security vulnerability
Details

libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2MSGUSERAUTHSUCCESS message in place of the SSH2MSGUSERAUTHREQUEST message which the server would expect to initiate authentication, the attacker could successfully authentciate without any credentials (CVE-2018-10933).

References
Credits

Affected packages

Mageia:6 / libssh

Package

Name
libssh
Purl
pkg:rpm/mageia/libssh?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.7.7-1.mga6

Ecosystem specific

{
    "section": "core"
}