Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-6210

Опубликовано: 13 фев. 2017
Источник: nvd
CVSS3: 5.9
CVSS2: 4.3
EPSS Критический

Описание

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:openbsd:openssh:*:p2:*:*:*:*:*:*
Версия до 7.2 (включая)

EPSS

Процентиль: 100%
0.92487
Критический

5.9 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 8 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.3
redhat
почти 9 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
debian
больше 8 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user pa ...

CVSS3: 5.9
github
около 3 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

oracle-oval
почти 8 лет назад

ELSA-2017-2563: openssh security update (MODERATE)

EPSS

Процентиль: 100%
0.92487
Критический

5.9 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-200