Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
CVE-2018-10933 libssh authentication bypass in server code (libssh.org)
9 points by nfoz on Oct 17, 2018 | hide | past | favorite | 3 comments



You're telling me that, basically, an attacker says "you've already said you trust me" and the server answers "sure, I did"? Wow.


"libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authentciate without any credentials.

The bug was discovered by Peter Winter-Smith of NCC Group."




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: