CVE-2018-7750

NameCVE-2018-7750
Descriptiontransport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1556-1
NVD severityhigh (attack range: remote)
Debian Bugs892859

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
paramiko (PTS)jessie1.15.1-1vulnerable
jessie (security)1.15.1-1+deb8u1fixed
stretch2.0.0-1vulnerable
buster, sid2.4.2-0.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
paramikosource(unstable)2.4.2-0.1high892859
paramikosourcejessie1.15.1-1+deb8u1highDLA-1556-1

Notes

[stretch] - paramiko <no-dsa> (Minor issue)
[wheezy] - paramiko <no-dsa> (Minor issue)
https://github.com/paramiko/paramiko/issues/1175
https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516

Search for package or bug name: Reporting problems