Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-1273

Опубликовано: 08 апр. 2009
Источник: debian
EPSS Низкий

Описание

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libpam-sshfixed1.92-7package
libpam-sshno-dsaetchpackage
libpam-sshfixed1.91.0-9.3+lenny1lennypackage

EPSS

Процентиль: 57%
0.00358
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

redhat
больше 16 лет назад

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

nvd
больше 16 лет назад

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

github
больше 3 лет назад

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

EPSS

Процентиль: 57%
0.00358
Низкий