CVE-2018-15473 (CNNVD-201808-536)

MEDIUM 有利用代码
中文标题:
OpenSSH 竞争条件问题漏洞
英文标题:
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an ...
CVSS分数: 5.3
发布时间: 2018-08-17 00:00:00
漏洞类型: 竞争条件问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v6
漏洞描述
中文描述:

OpenSSH(OpenBSD Secure Shell)是OpenBSD计划组的一套用于安全访问远程计算机的连接工具。该工具是SSH协议的开源实现,支持对所有的传输进行加密,可有效阻止窃听、连接劫持以及其他网络级的攻击。 OpenSSH 7.7及之前版本中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。

英文描述:

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.

CWE类型:
CWE-362
标签:
remote linux Matthew Daley Justin Gardner Leap Security
受影响产品
厂商 产品 版本 版本范围 平台 CPE
openbsd openssh * - - cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
debian debian_linux 8.0 - - cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debian debian_linux 9.0 - - cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 6.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 7.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 6.0 - - cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 7.0 - - cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 6.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 7.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
canonical ubuntu_linux 14.04 - - cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
canonical ubuntu_linux 16.04 - - cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
canonical ubuntu_linux 18.04 - - cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
netapp cn1610_firmware - - - cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*
netapp aff_baseboard_management_controller - - - cpe:2.3:a:netapp:aff_baseboard_management_controller:-:*:*:*:*:*:*:*
netapp cloud_backup - - - cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
netapp data_ontap_edge - - - cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
netapp fas_baseboard_management_controller - - - cpe:2.3:a:netapp:fas_baseboard_management_controller:-:*:*:*:*:*:*:*
netapp oncommand_unified_manager * - - cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
netapp ontap_select_deploy - - - cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*
netapp service_processor - - - cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*
netapp steelstore_cloud_integrated_storage - - - cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
netapp virtual_storage_console * - - cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vsphere:*:*
netapp clustered_data_ontap - - - cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
netapp data_ontap - - - cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*
netapp vasa_provider * - - cpe:2.3:a:netapp:vasa_provider:*:*:*:*:*:*:*:*
netapp storage_replication_adapter * - - cpe:2.3:a:netapp:storage_replication_adapter:*:*:*:*:*:vsphere:*:*
oracle sun_zfs_storage_appliance_kit 8.8.6 - - cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.6:*:*:*:*:*:*:*
siemens scalance_x204rna_firmware * - - cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
GLSA-201810-03 vendor-advisory
cve.org
访问
1041487 vdb-entry
cve.org
访问
45233 exploit
cve.org
访问
无标题 OTHER
cve.org
访问
45210 exploit
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
USN-3809-1 vendor-advisory
cve.org
访问
[debian-lts-announce] 20180821 [SECURITY] [DLA-1474-1] openssh security update mailing-list
cve.org
访问
105140 vdb-entry
cve.org
访问
DSA-4280 vendor-advisory
cve.org
访问
45939 exploit
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
RHSA-2019:0711 vendor-advisory
cve.org
访问
RHSA-2019:2143 vendor-advisory
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
ExploitDB EDB-45210 EXPLOIT
exploitdb
访问
Download Exploit EDB-45210 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2018-15473 ADVISORY
cve.org
访问
ExploitDB EDB-45233 EXPLOIT
exploitdb
访问
Download Exploit EDB-45233 EXPLOIT
exploitdb
访问
ExploitDB EDB-45939 EXPLOIT
exploitdb
访问
Download Exploit EDB-45939 EXPLOIT
exploitdb
访问
CVSS评分详情
5.3
MEDIUM
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS版本: 3.1
机密性
LOW
完整性
NONE
可用性
NONE
时间信息
发布时间:
2018-08-17 00:00:00
修改时间:
2024-08-05 09:54:03
创建时间:
2025-11-11 15:35:07
更新时间:
2025-11-11 16:49:37
利用信息
此漏洞有可利用代码!
利用代码数量: 3
利用来源:
未知 未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2018-15473 2025-11-11 15:19:42 2025-11-11 07:35:07
NVD nvd_CVE-2018-15473 2025-11-11 14:55:57 2025-11-11 07:43:42
CNNVD cnnvd_CNNVD-201808-536 2025-11-11 15:10:04 2025-11-11 07:53:53
EXPLOITDB exploitdb_EDB-45210 2025-11-11 15:05:26 2025-11-11 08:48:09
EXPLOITDB exploitdb_EDB-45233 2025-11-11 15:05:26 2025-11-11 08:48:11
EXPLOITDB exploitdb_EDB-45939 2025-11-11 15:05:26 2025-11-11 08:49:37
版本与语言
当前版本: v6
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v6 EXPLOITDB
2025-11-11 16:49:37
references_count: 23 → 25; tags_count: 4 → 5
查看详细变更
  • references_count: 23 -> 25
  • tags_count: 4 -> 5
v5 EXPLOITDB
2025-11-11 16:48:11
references_count: 21 → 23; tags_count: 3 → 4
查看详细变更
  • references_count: 21 -> 23
  • tags_count: 3 -> 4
v4 EXPLOITDB
2025-11-11 16:48:09
references_count: 18 → 21; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 18 -> 21
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:53:53
vulnerability_type: 未提取 → 竞争条件问题; cnnvd_id: 未提取 → CNNVD-201808-536; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 竞争条件问题
  • cnnvd_id: 未提取 -> CNNVD-201808-536
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:42
cvss_score: 未提取 → 5.3; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 0 → 28; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 5.3
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 0 -> 28
  • data_sources: ['cve'] -> ['cve', 'nvd']