A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.Referenceshttps://usn.ubuntu.com/3795-1/https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlhttps://usn.ubuntu.com/3795-2/https://www.debian.org/security/2018/dsa-4322https://www.exploit-db.com/exploits/45638/https://www.libssh.org/security/advisories/CVE-2018-10933.txthttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933http://www.securityfocus.com/bid/105677https://lists.debian.org/debian-lts-announce/2018/10/msg00010.htmlhttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016https://security.netapp.com/advisory/ntap-20190118-0002/