Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-6210

Опубликовано: 13 фев. 2017
Источник: ubuntu
Приоритет: low
CVSS2: 4.3
CVSS3: 5.9

Описание

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

РелизСтатусПримечание
devel

not-affected

1:7.3p1-1
esm-infra-legacy/trusty

not-affected

1:6.6p1-2ubuntu2.8
esm-infra/xenial

not-affected

1:7.2p2-4ubuntu2.1
precise

released

1:5.9p1-5ubuntu1.10
precise/esm

not-affected

1:5.9p1-5ubuntu1.10
trusty

released

1:6.6p1-2ubuntu2.8
trusty/esm

not-affected

1:6.6p1-2ubuntu2.8
upstream

released

1:7.2p2-6
vivid/stable-phone-overlay

ignored

end of life
vivid/ubuntu-core

ignored

end of life

Показывать по

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
почти 9 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
nvd
больше 8 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

CVSS3: 5.9
debian
больше 8 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user pa ...

CVSS3: 5.9
github
около 3 лет назад

sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.

oracle-oval
почти 8 лет назад

ELSA-2017-2563: openssh security update (MODERATE)

4.3 Medium

CVSS2

5.9 Medium

CVSS3