Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-20012

Опубликовано: 15 сент. 2021
Источник: ubuntu
Приоритет: negligible
EPSS Средний
CVSS2: 4.3
CVSS3: 5.3

Описание

** DISPUTED ** OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product.

РелизСтатусПримечание
bionic

ignored

devel

ignored

esm-infra-legacy/trusty

ignored

esm-infra/bionic

ignored

esm-infra/focal

ignored

esm-infra/xenial

ignored

fips-updates/bionic

ignored

fips-updates/focal

ignored

fips-updates/xenial

ignored

fips/bionic

ignored

Показывать по

РелизСтатусПримечание
bionic

ignored

devel

ignored

esm-apps/bionic

ignored

esm-apps/focal

ignored

esm-apps/jammy

ignored

esm-infra-legacy/trusty

DNE

focal

ignored

hirsute

ignored

impish

ignored

jammy

ignored

Показывать по

EPSS

Процентиль: 94%
0.14039
Средний

4.3 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
больше 9 лет назад

OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product

CVSS3: 5.3
nvd
почти 4 года назад

OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product

CVSS3: 5.3
debian
почти 4 года назад

OpenSSH through 8.7 allows remote attackers, who have a suspicion that ...

CVSS3: 5.3
github
около 3 лет назад

OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session.

CVSS3: 5.3
fstec
около 23 лет назад

Уязвимость средства криптографической защиты OpenSSH, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 94%
0.14039
Средний

4.3 Medium

CVSS2

5.3 Medium

CVSS3