CVE-2018-15473 (NVD)

2018-08-17

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.

Products Ubuntu_linux, Debian_linux, Aff_baseboard_management_controller, Cloud_backup, Clustered_data_ontap, Cn1610_firmware, Data_ontap, Data_ontap_edge, Fas_baseboard_management_controller, Oncommand_unified_manager, Ontap_select_deploy, Service_processor, Steelstore_cloud_integrated_storage, Storage_replication_adapter, Vasa_provider, Virtual_storage_console, Openssh, Sun_zfs_storage_appliance_kit, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_workstation, Scalance_x204rna_firmware
Type Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (CWE-362)
First patch https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
Relevant file/s • ./usr.bin/ssh/auth2-gss.c (modified, +7, -4)
• ./usr.bin/ssh/auth2-hostbased.c (modified, +6, -5)
• ./usr.bin/ssh/auth2-pubkey.c (modified, +15, -10)
Links https://www.exploit-db.com/exploits/45210/
https://www.debian.org/security/2018/dsa-4280
https://www.oracle.com/security-alerts/cpujan2020.html
http://www.securityfocus.com/bid/105140
https://security.gentoo.org/glsa/201810-03

src - Tree: 779974d35b

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: