{
  "threat_severity" : "Important",
  "public_date" : "2018-10-16T12:00:00Z",
  "bugzilla" : {
    "description" : "libssh: Authentication Bypass due to improper message callbacks implementation",
    "id" : "1614973",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1614973"
  },
  "cvss3" : {
    "cvss3_base_score" : "9.1",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-287",
  "details" : [ "A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.", "A vulnerability was found in libssh's server-side state machine. A malicious client could create channels without first performing authentication, resulting in unauthorized access." ],
  "statement" : "This vulnerability affects libssh shipped in Red Hat Enterprise Linux 7 Extras. No libssh packages are included in Red Hat Enterprise Linux 6 and earlier. This issue does not affect libssh2 or openssh.\nThis issue can only be affect applications that use libssh to implement an SSH server; SSH client functionality is not affected. No packages in Red Hat products use libssh to implement an SSH server. Therefore, no package from Red Hat that uses the libssh library is affected by this flaw.\nThe libssh library is available for customer or third party code to use. Such code that is linked against libssh and uses the `ssh_bind*` functions may be affected by this flaw.",
  "acknowledgement" : "Red Hat would like to thank the libssh team for reporting this issue. Upstream acknowledges Peter Winter-Smith (NCC Group) as the original reporter.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7 Extras",
    "release_date" : "2018-11-28T00:00:00Z",
    "advisory" : "RHBA-2018:3712",
    "cpe" : "cpe:/a:redhat:rhel_extras_other:7",
    "package" : "cockpit-0:176-4.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7 Extras",
    "release_date" : "2018-11-28T00:00:00Z",
    "advisory" : "RHBA-2018:3712",
    "cpe" : "cpe:/a:redhat:rhel_extras_other:7",
    "package" : "libssh-0:0.7.1-7.el7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "libssh2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "libssh2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "libssh",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "libssh2",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-10933\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-10933\nhttps://www.libssh.org/security/advisories/CVE-2018-10933.txt" ],
  "name" : "CVE-2018-10933",
  "csaw" : false
}