CVE-2018-15473 (CNNVD-201808-536)
MEDIUM
有利用代码
中文标题:
OpenSSH 竞争条件问题漏洞
英文标题:
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an ...
CVSS分数:
5.3
发布时间:
2018-08-17 00:00:00
漏洞类型:
竞争条件问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v6
漏洞描述
中文描述:
OpenSSH(OpenBSD Secure Shell)是OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 7.7及之前版本中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。
英文描述:
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CWE类型:
CWE-362
标签:
remote
linux
Matthew Daley
Justin Gardner
Leap Security
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| openbsd | openssh | * | - | - |
cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 14.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 16.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 18.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
|
| netapp | cn1610_firmware | - | - | - |
cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*
|
| netapp | aff_baseboard_management_controller | - | - | - |
cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*
|
| netapp | cloud_backup | - | - | - |
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
|
| netapp | data_ontap_edge | - | - | - |
cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
|
| netapp | fas_baseboard_management_controller | - | - | - |
cpe:2.3:a:netapp:fas_baseboard_management_controller:-:*:*:*:*:*:*:*
|
| netapp | oncommand_unified_manager | * | - | - |
cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
|
| netapp | ontap_select_deploy | - | - | - |
cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*
|
| netapp | service_processor | - | - | - |
cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*
|
| netapp | steelstore_cloud_integrated_storage | - | - | - |
cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
|
| netapp | virtual_storage_console | * | - | - |
cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vsphere:*:*
|
| netapp | clustered_data_ontap | - | - | - |
cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
|
| netapp | data_ontap | - | - | - |
cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*
|
| netapp | vasa_provider | * | - | - |
cpe:2.3:a:netapp:vasa_provider:*:*:*:*:*:*:*:*
|
| netapp | storage_replication_adapter | * | - | - |
cpe:2.3:a:netapp:storage_replication_adapter:*:*:*:*:*:vsphere:*:*
|
| oracle | sun_zfs_storage_appliance_kit | 8.8.6 | - | - |
cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.6:*:*:*:*:*:*:*
|
| siemens | scalance_x204rna_firmware | * | - | - |
cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
GLSA-201810-03
vendor-advisory
cve.org
访问
cve.org
1041487
vdb-entry
cve.org
访问
cve.org
45233
exploit
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
45210
exploit
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
USN-3809-1
vendor-advisory
cve.org
访问
cve.org
[debian-lts-announce] 20180821 [SECURITY] [DLA-1474-1] openssh security update
mailing-list
cve.org
访问
cve.org
105140
vdb-entry
cve.org
访问
cve.org
DSA-4280
vendor-advisory
cve.org
访问
cve.org
45939
exploit
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
RHSA-2019:0711
vendor-advisory
cve.org
访问
cve.org
RHSA-2019:2143
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
ExploitDB EDB-45210
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-45210
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2018-15473
ADVISORY
cve.org
访问
cve.org
ExploitDB EDB-45233
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-45233
EXPLOIT
exploitdb
访问
exploitdb
ExploitDB EDB-45939
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-45939
EXPLOIT
exploitdb
访问
exploitdb
CVSS评分详情
5.3
MEDIUM
CVSS向量:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS版本:
3.1
机密性
LOW
完整性
NONE
可用性
NONE
时间信息
发布时间:
2018-08-17 00:00:00
修改时间:
2024-08-05 09:54:03
创建时间:
2025-11-11 15:35:07
更新时间:
2025-11-11 16:49:37
利用信息
此漏洞有可利用代码!
利用代码数量:
3
利用来源:
未知
未知
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2018-15473 |
2025-11-11 15:19:42 | 2025-11-11 07:35:07 |
| NVD | nvd_CVE-2018-15473 |
2025-11-11 14:55:57 | 2025-11-11 07:43:42 |
| CNNVD | cnnvd_CNNVD-201808-536 |
2025-11-11 15:10:04 | 2025-11-11 07:53:53 |
| EXPLOITDB | exploitdb_EDB-45210 |
2025-11-11 15:05:26 | 2025-11-11 08:48:09 |
| EXPLOITDB | exploitdb_EDB-45233 |
2025-11-11 15:05:26 | 2025-11-11 08:48:11 |
| EXPLOITDB | exploitdb_EDB-45939 |
2025-11-11 15:05:26 | 2025-11-11 08:49:37 |
版本与语言
当前版本:
v6
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v6
EXPLOITDB
2025-11-11 16:49:37
references_count: 23 → 25; tags_count: 4 → 5
查看详细变更
- references_count: 23 -> 25
- tags_count: 4 -> 5
v5
EXPLOITDB
2025-11-11 16:48:11
references_count: 21 → 23; tags_count: 3 → 4
查看详细变更
- references_count: 21 -> 23
- tags_count: 3 -> 4
v4
EXPLOITDB
2025-11-11 16:48:09
references_count: 18 → 21; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 18 -> 21
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:53:53
vulnerability_type: 未提取 → 竞争条件问题; cnnvd_id: 未提取 → CNNVD-201808-536; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 竞争条件问题
- cnnvd_id: 未提取 -> CNNVD-201808-536
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:43:42
cvss_score: 未提取 → 5.3; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 0 → 28; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.3
- cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- cvss_version: NOT_EXTRACTED -> 3.1
- affected_products_count: 0 -> 28
- data_sources: ['cve'] -> ['cve', 'nvd']