Vulnerability CVE-2009-1273


Published: 2009-04-08   Modified: 2012-02-13

Description:
pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

Type:

CWE-255

(Credentials Management)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Andrew j.korty -> Pam ssh 

 References:
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00145.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00116.html
http://secunia.com/advisories/34986
http://secunia.com/advisories/34536
http://bugs.gentoo.org/show_bug.cgi?id=263579

Copyright 2024, cxsecurity.com

 

Back to Top