Описание
pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
Релиз | Статус | Примечание |
---|---|---|
artful | ignored | end of life |
bionic | not-affected | code not present |
cosmic | ignored | end of life |
dapper | ignored | end of life |
devel | not-affected | code not present |
disco | ignored | end of life |
eoan | not-affected | code not present |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/bionic | not-affected | code not present |
esm-infra/xenial | not-affected | code not present |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RH ...
pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
ELSA-2010-0258: pam_krb5 security and bug fix update (LOW)
EPSS
5 Medium
CVSS2