Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-1384

Опубликовано: 27 мая 2009
Источник: redhat
CVSS2: 2.6
EPSS Низкий

Описание

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

Отчет

This issue did not affect the versions of the pam_krb5 packages, as shipped with Red Hat Enterprise Linux 3 and 4.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=502602pam_krb5: Password prompt varies for existent and non-existent users

EPSS

Процентиль: 80%
0.01518
Низкий

2.6 Low

CVSS2

Связанные уязвимости

ubuntu
около 16 лет назад

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

nvd
около 16 лет назад

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

debian
около 16 лет назад

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RH ...

github
около 3 лет назад

pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.

oracle-oval
около 15 лет назад

ELSA-2010-0258: pam_krb5 security and bug fix update (LOW)

EPSS

Процентиль: 80%
0.01518
Низкий

2.6 Low

CVSS2