Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-15919

Опубликовано: 28 авг. 2018
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'

A vulnerability was found in OpenSSH Server, where failed GSSAPI authentication attempts elicit different responses depending on whether the target username exists, a remote attacker could exploit this behavior to enumerate valid usernames on a system, potentially aiding in further attacks. This issue could be leveraged in reconnaissance efforts to identify existing user accounts.

Отчет

This vulnerability is rated as moderate because OpenSSH Server responds differently to failed GSSAPI authentication attempts based on whether a target username exists, while this does not directly compromise system integrity, it could facilitate further attacks such as brute-force or credential-stuffing attempts.

Меры по смягчению последствий

If GSSAPI Authentication is not required, this flaw can be mitigated by changing the global configuration in /etc/ssh/sshd_config from GSSAPIAuthentication yes to GSSAPIAuthentication no.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5opensshNot affected
Red Hat Enterprise Linux 6opensshNot affected
Red Hat Enterprise Linux 7opensshWill not fix
Red Hat Enterprise Linux 8opensshWill not fix
Red Hat Virtualization 4opensshWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1623184openssh: User enumeration via malformed packets in authentication requests

EPSS

Процентиль: 84%
0.02073
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 7 лет назад

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'

CVSS3: 5.3
nvd
больше 7 лет назад

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'

CVSS3: 5.3
debian
больше 7 лет назад

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 co ...

CVSS3: 5.3
github
больше 3 лет назад

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'

CVSS3: 5.3
fstec
больше 7 лет назад

Уязвимость средства криптографической защиты OpenSSH, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 84%
0.02073
Низкий

5.3 Medium

CVSS3