cpe:/a:andrew_j.korty:pam_ssh:1.92 CVE-2009-1273 2009-04-08T14:30:00.233-04:00 2009-05-13T01:27:44.627-04:00 5.0 NETWORK LOW NONE PARTIAL NONE NONE http://nvd.nist.gov 2009-04-08T15:05:00.000-04:00 SECUNIA 34536 SECUNIA 34986 FEDORA FEDORA-2009-3500 FEDORA FEDORA-2009-3627 CONFIRM http://bugs.gentoo.org/show_bug.cgi?id=263579 pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.