5.3
CVE-2018-15473
- EPSS 90.29%
- Veröffentlicht 17.08.2018 19:29:00
- Zuletzt bearbeitet 21.11.2024 03:50:53
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Debian ≫ Debian Linux Version8.0
Debian ≫ Debian Linux Version9.0
Redhat ≫ Enterprise Linux Desktop Version6.0
Redhat ≫ Enterprise Linux Desktop Version7.0
Redhat ≫ Enterprise Linux Server Version6.0
Redhat ≫ Enterprise Linux Server Version7.0
Redhat ≫ Enterprise Linux Workstation Version6.0
Redhat ≫ Enterprise Linux Workstation Version7.0
Canonical ≫ Ubuntu Linux Version14.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version16.04 SwEditionlts
Canonical ≫ Ubuntu Linux Version18.04 SwEditionlts
Netapp ≫ Cn1610 Firmware Version-
Netapp ≫ Aff Baseboard Management Controller Version-
Netapp ≫ Cloud Backup Version-
Netapp ≫ Data Ontap Edge Version-
Netapp ≫ Fas Baseboard Management Controller Version-
Netapp ≫ Oncommand Unified Manager SwPlatformvsphere Version >= 9.4
Netapp ≫ Ontap Select Deploy Version-
Netapp ≫ Service Processor Version-
Netapp ≫ Steelstore Cloud Integrated Storage Version-
Netapp ≫ Virtual Storage Console SwPlatformvsphere Version >= 7.2
Netapp ≫ Clustered Data Ontap Version-
Netapp ≫ Data Ontap Version- SwPlatform7-mode
Netapp ≫ Vasa Provider Version >= 7.2
Netapp ≫ Storage Replication Adapter SwPlatformvsphere Version >= 7.2
Oracle ≫ Sun Zfs Storage Appliance Kit Version8.8.6
Siemens ≫ Scalance X204rna Firmware Version < 3.2.7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 90.29% | 0.996 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.