CVE-2018-15473

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
References
Link Resource
http://www.openwall.com/lists/oss-security/2018/08/15/5 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/105140 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041487 Broken Link Patch Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:0711 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2143 Third Party Advisory
https://bugs.debian.org/906236 Issue Tracking Mailing List Patch Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf Patch Third Party Advisory
https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 Patch
https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html Mailing List Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011 Third Party Advisory
https://security.gentoo.org/glsa/201810-03 Third Party Advisory
https://security.netapp.com/advisory/ntap-20181101-0001/ Third Party Advisory
https://usn.ubuntu.com/3809-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4280 Third Party Advisory
https://www.exploit-db.com/exploits/45210/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45233/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45939/ Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/cpujan2020.html Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2018/08/15/5 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/105140 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041487 Broken Link Patch Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:0711 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2143 Third Party Advisory
https://bugs.debian.org/906236 Issue Tracking Mailing List Patch Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf Patch Third Party Advisory
https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 Patch
https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html Mailing List Third Party Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011 Third Party Advisory
https://security.gentoo.org/glsa/201810-03 Third Party Advisory
https://security.netapp.com/advisory/ntap-20181101-0001/ Third Party Advisory
https://usn.ubuntu.com/3809-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4280 Third Party Advisory
https://www.exploit-db.com/exploits/45210/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45233/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45939/ Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/cpujan2020.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:fas_baseboard_management_controller:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vsphere:*:*
cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*

Configuration 7 (hide)

AND
cpe:2.3:a:netapp:vasa_provider:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:a:netapp:storage_replication_adapter:*:*:*:*:*:vsphere:*:*
cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*

Configuration 9 (hide)

cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.6:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:50

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2018/08/15/5 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2018/08/15/5 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/105140 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105140 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1041487 - Broken Link, Patch, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041487 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2019:0711 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0711 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2143 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2143 - Third Party Advisory
References () https://bugs.debian.org/906236 - Issue Tracking, Mailing List, Patch, Third Party Advisory () https://bugs.debian.org/906236 - Issue Tracking, Mailing List, Patch, Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf - Patch, Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf - Patch, Third Party Advisory
References () https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 - Patch () https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 - Patch
References () https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html - Mailing List, Third Party Advisory
References () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011 - Third Party Advisory () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011 - Third Party Advisory
References () https://security.gentoo.org/glsa/201810-03 - Third Party Advisory () https://security.gentoo.org/glsa/201810-03 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20181101-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20181101-0001/ - Third Party Advisory
References () https://usn.ubuntu.com/3809-1/ - Third Party Advisory () https://usn.ubuntu.com/3809-1/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4280 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4280 - Third Party Advisory
References () https://www.exploit-db.com/exploits/45210/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45210/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/45233/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45233/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/45939/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45939/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory

23 Feb 2023, 23:13

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.6:*:*:*:*:*:*:*
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf - Patch, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2143 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2143 - Third Party Advisory
References (MISC) https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 - Third Party Advisory (MISC) https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 - Patch
References (BID) http://www.securityfocus.com/bid/105140 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/105140 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id/1041487 - Patch, Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1041487 - Broken Link, Patch, Third Party Advisory, VDB Entry
References (MISC) https://www.oracle.com/security-alerts/cpujan2020.html - (MISC) https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory

13 Dec 2022, 12:15

Type Values Removed Values Added
References
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf -

Information

Published : 2018-08-17 19:29

Updated : 2024-11-21 03:50


NVD link : CVE-2018-15473

Mitre link : CVE-2018-15473

CVE.ORG link : CVE-2018-15473


JSON object : View

Products Affected

netapp

  • steelstore_cloud_integrated_storage
  • oncommand_unified_manager
  • cn1610_firmware
  • data_ontap_edge
  • cloud_backup
  • fas_baseboard_management_controller
  • cn1610
  • aff_baseboard_management_controller
  • vasa_provider
  • virtual_storage_console
  • storage_replication_adapter
  • ontap_select_deploy
  • data_ontap
  • clustered_data_ontap
  • service_processor

canonical

  • ubuntu_linux

oracle

  • sun_zfs_storage_appliance_kit

siemens

  • scalance_x204rna_firmware
  • scalance_x204rna

openbsd

  • openssh

redhat

  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_server

debian

  • debian_linux
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')