<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is Check Point software vulnerable to CVE-2018-10933? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-software-vulnerable-to-CVE-2018-10933/m-p/8079#M417</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14.4px;"&gt;A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10933"&gt;CVE-2018-10933&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Oct 2018 14:51:47 GMT</pubDate>
    <dc:creator>phlrnnr</dc:creator>
    <dc:date>2018-10-22T14:51:47Z</dc:date>
    <item>
      <title>Is Check Point software vulnerable to CVE-2018-10933?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-software-vulnerable-to-CVE-2018-10933/m-p/8079#M417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14.4px;"&gt;A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10933"&gt;CVE-2018-10933&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Oct 2018 14:51:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-software-vulnerable-to-CVE-2018-10933/m-p/8079#M417</guid>
      <dc:creator>phlrnnr</dc:creator>
      <dc:date>2018-10-22T14:51:47Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point software vulnerable to CVE-2018-10933?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-software-vulnerable-to-CVE-2018-10933/m-p/8080#M418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check Point doesn't use libssh in it's products.&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk138552" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk138552"&gt;Check Point response to CVE-2018-10933 (libssh)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Oct 2018 21:43:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-software-vulnerable-to-CVE-2018-10933/m-p/8080#M418</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-10-22T21:43:58Z</dc:date>
    </item>
  </channel>
</rss>

