{"id":"ALPINE-CVE-2018-7750","details":"transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.","modified":"2025-11-19T06:14:27.960143Z","published":"2018-03-13T18:29:00.303Z","upstream":["CVE-2018-7750"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2018-7750"}],"affected":[{"package":{"name":"py3-paramiko","ecosystem":"Alpine:v3.11","purl":"pkg:apk/alpine/py3-paramiko?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.1-r0"}]}],"versions":["1.10.1-r0","1.11.0-r0","1.12.0-r0","1.14.0-r0","1.14.1-r0","1.15.1-r0","1.15.2-r0","1.16.0-r0","1.7.7.1-r0","1.9.0-r0","2.0.1-r1","2.0.1-r2","2.0.2-r0","2.0.2-r1","2.0.2-r2","2.0.2-r3","2.1.2-r0","2.2.0-r0","2.2.1-r0","2.2.1-r1","2.3.1-r0","2.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2018-7750.json"}},{"package":{"name":"py3-paramiko","ecosystem":"Alpine:v3.12","purl":"pkg:apk/alpine/py3-paramiko?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.1-r0"}]}],"versions":["1.10.1-r0","1.11.0-r0","1.12.0-r0","1.14.0-r0","1.14.1-r0","1.15.1-r0","1.15.2-r0","1.16.0-r0","1.7.7.1-r0","1.9.0-r0","2.0.1-r1","2.0.1-r2","2.0.2-r0","2.0.2-r1","2.0.2-r2","2.0.2-r3","2.1.2-r0","2.2.0-r0","2.2.1-r0","2.2.1-r1","2.3.1-r0","2.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2018-7750.json"}},{"package":{"name":"py3-paramiko","ecosystem":"Alpine:v3.13","purl":"pkg:apk/alpine/py3-paramiko?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.1-r0"}]}],"versions":["1.10.1-r0","1.11.0-r0","1.12.0-r0","1.14.0-r0","1.14.1-r0","1.15.1-r0","1.15.2-r0","1.16.0-r0","1.7.7.1-r0","1.9.0-r0","2.0.1-r1","2.0.1-r2","2.0.2-r0","2.0.2-r1","2.0.2-r2","2.0.2-r3","2.1.2-r0","2.2.0-r0","2.2.1-r0","2.2.1-r1","2.3.1-r0","2.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2018-7750.json"}},{"package":{"name":"py3-paramiko","ecosystem":"Alpine:v3.14","purl":"pkg:apk/alpine/py3-paramiko?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.1-r0"}]}],"versions":["1.10.1-r0","1.11.0-r0","1.12.0-r0","1.14.0-r0","1.14.1-r0","1.15.1-r0","1.15.2-r0","1.16.0-r0","1.7.7.1-r0","1.9.0-r0","2.0.1-r1","2.0.1-r2","2.0.2-r0","2.0.2-r1","2.0.2-r2","2.0.2-r3","2.1.2-r0","2.2.0-r0","2.2.1-r0","2.2.1-r1","2.3.1-r0","2.4.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2018-7750.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}