Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-1273

Опубликовано: 08 апр. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5

Описание

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

1.92-7
gutsy

ignored

end of life, was needs-triage
hardy

ignored

end of life
intrepid

ignored

end of life, was needs-triage
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

not-affected

1.92-7
maverick

not-affected

1.92-7
natty

not-affected

1.92-7

Показывать по

Ссылки на источники

EPSS

Процентиль: 57%
0.00358
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 16 лет назад

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

nvd
больше 16 лет назад

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

debian
больше 16 лет назад

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled ...

github
больше 3 лет назад

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

EPSS

Процентиль: 57%
0.00358
Низкий

5 Medium

CVSS2