CVE-2018-1000805

Source
https://cve.org/CVERecord?id=CVE-2018-1000805
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000805.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-1000805
Aliases
Downstream
Related
Published
2018-10-08T15:29:00.713Z
Modified
2026-04-11T12:06:27.225310Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.04"
                }
            ],
            "cpe": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "14.04"
                }
            ],
            "cpe": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "16.04"
                }
            ],
            "cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "18.04"
                }
            ],
            "cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "18.10"
                }
            ],
            "cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                }
            ],
            "cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.0"
                }
            ],
            "cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.0"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.0"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.4"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.5"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.6"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.6"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.7"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.6"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.6"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.6"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.0"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
        }
    ]
}
References

Affected packages

Git / github.com/paramiko/paramiko

Affected ranges

Type
GIT
Repo
https://github.com/paramiko/paramiko
Events
Database specific
{
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.17.6"
        },
        {
            "last_affected": "1.18.5"
        },
        {
            "last_affected": "2.0.8"
        },
        {
            "last_affected": "2.1.5"
        },
        {
            "last_affected": "2.2.3"
        },
        {
            "last_affected": "2.3.2"
        },
        {
            "last_affected": "2.4.1"
        },
        {
            "last_affected": "3.3"
        },
        {
            "last_affected": "4.0"
        }
    ],
    "cpe": [
        "cpe:2.3:a:paramiko:paramiko:1.17.6:*:*:*:*:*:*:*",
        "cpe:2.3:a:paramiko:paramiko:1.18.5:*:*:*:*:*:*:*",
        "cpe:2.3:a:paramiko:paramiko:2.0.8:*:*:*:*:*:*:*",
        "cpe:2.3:a:paramiko:paramiko:2.1.5:*:*:*:*:*:*:*",
        "cpe:2.3:a:paramiko:paramiko:2.2.3:*:*:*:*:*:*:*",
        "cpe:2.3:a:paramiko:paramiko:2.3.2:*:*:*:*:*:*:*",
        "cpe:2.3:a:paramiko:paramiko:2.4.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
        "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"
    ]
}

Affected versions

1.*
1.11.0
1.12.0
1.15.0
1.15.2
1.16.1
1.16.2
1.16.3
1.17.0
1.17.1
1.17.2
1.17.3
1.17.4
1.17.5
1.17.6
1.18.0
1.18.1
1.18.2
1.18.3
1.18.4
1.18.5
1.7.7.1
1.7.7.2
1.8.0
2.*
2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.7
2.0.8
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.11.0
2.12.0
2.2.0
2.2.1
2.2.3
2.3.0
2.3.1
2.3.2
2.4.0
2.4.1
2.7.0
2.8.0
2.8.1
3.*
3.0.0
3.1.0
3.2.0
3.3.0
3.4.0
3.5.0
3.5.1
4.*
4.0.0
Other
initial-merge-from-ssh-done
release-1.*
release-1.7.4
release-1.7.5
release-1.7.6
v1.*
v1.11.0
v1.12.0
v1.15.0
v1.15.2
v1.16.1
v1.16.2
v1.16.3
v1.17.0
v1.17.1
v1.17.2
v1.17.3
v1.18.0
v1.18.1
v1.7.7.1
v1.7.7.2
v1.8.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000805.json"