[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-5052Date: (C)2006-09-27   (M)2023-12-22


Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECTRACK-1016939
http://www.securityfocus.com/archive/1/archive/1/447861/100/200/threaded
BID-20245
SECUNIA-22158
SECUNIA-22173
SECUNIA-22495
SECUNIA-22823
SECUNIA-24479
SECUNIA-27588
SECUNIA-28320
OSVDB-29266
ADV-2007-0930
APPLE-SA-2007-03-13
GLSA-200611-06
RHSA-2006:0697
RHSA-2007:0540
RHSA-2007:0703
SSA:2006-272-02
SUSE-SA:2006:062
TA07-072A
http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2
http://docs.info.apple.com/article.html?artnum=305214
http://openssh.org/txt/release-4.4
http://support.avaya.com/elmodocs2/security/ASA-2007-527.htm
https://issues.rpath.com/browse/RPL-681
openssh-gssapi-user-enumeration(29255)

CPE    56
cpe:/a:openbsd:openssh:1.2.3
cpe:/a:openbsd:openssh:1.2.2
cpe:/a:openbsd:openssh:1.2.1
cpe:/a:openbsd:openssh:3.7.1p2
...

© SecPod Technologies