CVE-2018-1000805

Current Description

Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.

Basic Data

PublishedOctober 08, 2018
Last ModifiedOctober 03, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-732
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationSINGLE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.5
SeverityMEDIUM
Exploitability Score8.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 3 - Attack VectorNETWORK
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredLOW
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactHIGH
CVSS 3 - Availability ImpactHIGH
CVSS 3 - Base Score8.8
CVSS 3 - Base SeverityHIGH
Exploitability Score2.8
Base SeverityHIGH

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationParamikoParamiko1.17.6*******
    2.3ApplicationParamikoParamiko1.18.5*******
    2.3ApplicationParamikoParamiko2.0.8*******
    2.3ApplicationParamikoParamiko2.1.5*******
    2.3ApplicationParamikoParamiko2.2.3*******
    2.3ApplicationParamikoParamiko2.3.2*******
    2.3ApplicationParamikoParamiko2.4.1*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatAnsible Tower3.3*******
    2.3ApplicationRedhatVirtualization Host4.0*******
    2.3OSRedhatEnterprise Linux Desktop6.0*******
    2.3OSRedhatEnterprise Linux Desktop7.0*******
    2.3OSRedhatEnterprise Linux Server6.0*******
    2.3OSRedhatEnterprise Linux Server7.0*******
    2.3OSRedhatEnterprise Linux Server Aus6.4*******
    2.3OSRedhatEnterprise Linux Server Aus6.5*******
    2.3OSRedhatEnterprise Linux Server Aus6.6*******
    2.3OSRedhatEnterprise Linux Server Aus7.6*******
    2.3OSRedhatEnterprise Linux Server Eus6.7*******
    2.3OSRedhatEnterprise Linux Server Eus7.6*******
    2.3OSRedhatEnterprise Linux Server Tus6.6*******
    2.3OSRedhatEnterprise Linux Server Tus7.6*******
    2.3OSRedhatEnterprise Linux Workstation6.0*******
    2.3OSRedhatEnterprise Linux Workstation7.0*******
    2.3OSRedhatVirtualization4.0*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux8.0*******
  • OR - Configuration 4
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux12.04***esm***
    2.3OSCanonicalUbuntu Linux14.04***lts***
    2.3OSCanonicalUbuntu Linux16.04***lts***
    2.3OSCanonicalUbuntu Linux18.04***lts***
    2.3OSCanonicalUbuntu Linux18.10*******

Vulnerable Software List

VendorProductVersions
Paramiko Paramiko 1.17.6, 1.18.5, 2.0.8, 2.1.5, 2.2.3, 2.3.2, 2.4.1
Debian Debian Linux 8.0
Redhat Ansible Tower 3.3
Redhat Enterprise Linux Workstation 6.0, 7.0
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Desktop 6.0, 7.0
Redhat Enterprise Linux Server Aus 6.4, 6.5, 6.6, 7.6
Redhat Enterprise Linux Server Tus 6.6, 7.6
Redhat Enterprise Linux Server Eus 6.7, 7.6
Redhat Virtualization 4.0
Redhat Enterprise Linux Server 6.0, 7.0
Canonical Ubuntu Linux 12.04, 14.04, 16.04, 18.04, 18.10

References

NameSourceURLTags
RHBA-2018:3497https://access.redhat.com/errata/RHBA-2018:3497REDHATThird Party Advisory
RHSA-2018:3347https://access.redhat.com/errata/RHSA-2018:3347REDHATThird Party Advisory
RHSA-2018:3406https://access.redhat.com/errata/RHSA-2018:3406REDHATThird Party Advisory
RHSA-2018:3505https://access.redhat.com/errata/RHSA-2018:3505REDHATThird Party Advisory
https://github.com/paramiko/paramiko/issues/1283https://github.com/paramiko/paramiko/issues/1283CONFIRMPatch Third Party Advisory
https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txthttps://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txtMISCExploit Third Party Advisory
[debian-lts-announce] 20181027 [SECURITY] [DLA 1556-1] paramiko security updatehttps://lists.debian.org/debian-lts-announce/2018/10/msg00018.htmlMLISTMailing List Third Party Advisory
USN-3796-1https://usn.ubuntu.com/3796-1/UBUNTUThird Party Advisory
USN-3796-2https://usn.ubuntu.com/3796-2/UBUNTUThird Party Advisory
USN-3796-3https://usn.ubuntu.com/3796-3/UBUNTUThird Party Advisory