[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-1273

Date: (C)2009-04-08   (M)2015-12-16
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: NONE











pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.

Reference:
SECUNIA-34536
SECUNIA-34986
FEDORA-2009-3500
FEDORA-2009-3627
http://bugs.gentoo.org/show_bug.cgi?id=263579

CWE    1
CWE-255
OVAL    2
oval:org.secpod.oval:def:101526
oval:org.secpod.oval:def:101392

© 2013 SecPod Technologies