Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-1384

Опубликовано: 28 мая 2009
Источник: debian
EPSS Низкий

Описание

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libpam-krb5not-affectedpackage

EPSS

Процентиль: 80%
0.01518
Низкий

Связанные уязвимости

ubuntu
около 16 лет назад

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

redhat
около 16 лет назад

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

nvd
около 16 лет назад

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

github
около 3 лет назад

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

oracle-oval
около 15 лет назад

ELSA-2010-0258: pam_krb5 security and bug fix update (LOW)

EPSS

Процентиль: 80%
0.01518
Низкий