Security flaw in Secure Shell’s implementation library luckily did not affect GitHub

Security flaw in Secure Shell’s implementation library luckily did not affect GitHub

Security researcher Peter Winter-Smith from NCC Group recently discovered a vulnerability in Secure Shell’s implementation library (Libssh) which allows attackers to bypass the authentication and gain command over a remote server.

By sending a specific message which fakes a successful authentication to the targeted server, the attacker is granted access without even being asked for a password. As the flaw impacted the Libssh version 0.6 which was released in 2014, the zero-day bug had been there for four years. According to The Hacker News the Libssh team already patched the flaw in their latest update.

Read more about this server vulnerability and if you could be affected here.

Copyright Lyonsdown Limited 2021

Top Articles

RockYou2021 data leak: 8.4 billion passwords compromised

A report shows that 100GB of data which includes 8.4 billion passwords have been recently leaked on the internet, people are being encouraged to secure their accounts.

Hackers Breach Electronic Arts & Steal Game Code

Electronic Arts, one of the world's biggest video game publishers including games such as FIFA, Madden, Sims and Medal of Honor, are the latest company to be hacked.

JBS Foods paid £7.7m in ransom to REvil ransomware gang

JBS Foods, the world’s largest processor of beef and poultry products, has admitted to paying a ransom of $11 million to cyber criminals, a week after it announced that operations…

Related Articles

[s2Member-Login login_redirect=”https://www.teiss.co.uk” /]