[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.4] openssh: User enumeration via covert timing channel (CVE-2016-6210)

ID: oval:org.secpod.oval:def:1800790Date: (C)2018-03-29   (M)2022-12-21
Class: PATCHFamily: unix




When SSHD tries to authenticate a non-existing user, it will pick up a fake password structure hardcoded in the SSHD source code. On this hard coded password structure the password hash is based on BLOWFISH algorithm.If real users passwords are hashed using SHA256/SHA512, then sending large passwords will result in shorter response time from the server for non-existing users.

Platform:
Alpine Linux 3.4
Product:
openssh
Reference:
5926
CVE-2016-6210
CVE    1
CVE-2016-6210
CPE    2
cpe:/o:alpinelinux:alpine_linux:3.4
cpe:/a:openbsd:openssh

© SecPod Technologies