cpe:/a:paramiko:paramiko:1.17.6 cpe:/a:paramiko:paramiko:1.18.5 cpe:/a:paramiko:paramiko:2.0.8 cpe:/a:paramiko:paramiko:2.1.5 cpe:/a:paramiko:paramiko:2.2.3 cpe:/a:paramiko:paramiko:2.3.2 cpe:/a:paramiko:paramiko:2.4.1 cpe:/a:redhat:ansible_tower:3.3 cpe:/a:redhat:virtualization_host:4.0 cpe:/o:canonical:ubuntu_linux:12.04::~~esm~~~ cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:18.10 cpe:/o:debian:debian_linux:8.0 cpe:/o:redhat:enterprise_linux_desktop:6.0 cpe:/o:redhat:enterprise_linux_desktop:7.0 cpe:/o:redhat:enterprise_linux_server:6.0 cpe:/o:redhat:enterprise_linux_server:7.0 cpe:/o:redhat:enterprise_linux_server_aus:6.4 cpe:/o:redhat:enterprise_linux_server_aus:6.5 cpe:/o:redhat:enterprise_linux_server_aus:6.6 cpe:/o:redhat:enterprise_linux_server_aus:7.6 cpe:/o:redhat:enterprise_linux_server_eus:6.7 cpe:/o:redhat:enterprise_linux_server_eus:7.6 cpe:/o:redhat:enterprise_linux_server_tus:6.6 cpe:/o:redhat:enterprise_linux_server_tus:7.6 cpe:/o:redhat:enterprise_linux_workstation:6.0 cpe:/o:redhat:enterprise_linux_workstation:7.0 cpe:/o:redhat:virtualization:4.0 CVE-2018-1000805 2018-10-08T11:29:00.713-04:00 2019-10-02T20:03:26.223-04:00 6.5 NETWORK LOW SINGLE_INSTANCE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2019-04-16T14:08:12.580-04:00 REDHAT RHBA-2018:3497 REDHAT RHSA-2018:3347 REDHAT RHSA-2018:3406 REDHAT RHSA-2018:3505 UBUNTU USN-3796-1 UBUNTU USN-3796-2 UBUNTU USN-3796-3 MLIST [debian-lts-announce] 20181027 [SECURITY] [DLA 1556-1] paramiko security update CONFIRM https://github.com/paramiko/paramiko/issues/1283 MISC https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.