Do your applications use this vulnerable package?
Test your applications
Overview
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
References
- CONFIRM
- CVE Details
- Debian Bug Report
- Debian Security Advisory
- Debian Security Announcement
- Debian Security Tracker
- Exploit DB
- Exploit DB
- Exploit DB
- Gentoo Security Advisory
- GitHub Commit
- MISC
- Netapp Security Advisory
- OSS security Advisory
- RHSA Security Advisory
- RHSA Security Advisory
- Security Focus
- Security Tracker
- Ubuntu CVE Tracker
- Ubuntu Security Advisory
CVSS Score
5.3
medium severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityLow
-
IntegrityNone
-
AvailabilityNone
- CVE
- CVE-2018-15473
- CWE
- CWE-362
- Snyk ID
- SNYK-DEBIAN9-OPENSSH-368707
- Disclosed
- 17 Aug, 2018
- Published
- 22 Aug, 2018