A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
Published: 2018-10-17
A newly announced vulnerability in libssh, a multiplatform library that supports the Secure Shell (SSH) protocol, allows attackers to bypass authentication and gain full control over vulnerable servers.
https://www.tenable.com/blog/libssh-vulnerable-to-authentication-bypass-cve-2018-10933
https://www.tenable.com/blog/oracle-s-january-critical-patch-update-addresses-nearly-300-fixes
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.libssh.org/security/advisories/CVE-2018-10933.txt
https://www.exploit-db.com/exploits/45638/
https://www.debian.org/security/2018/dsa-4322
https://usn.ubuntu.com/3795-2/
https://usn.ubuntu.com/3795-1/
https://security.netapp.com/advisory/ntap-20190118-0002/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016
https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html