Lucene search

K
f5F5SOL6876
HistoryDec 07, 2006 - 12:00 a.m.

SOL6876 - OpenSSH vulnerabilities CVE-2006-5052

2006-12-0700:00:00
support.f5.com
22

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.021 Low

EPSS

Percentile

87.8%

This security advisory describes an OpenSSH vulnerability. OpenSSH versions previous to version 4.4, on platforms with GSSAPI enabled, allow remote attackers to determine the validity of usernames through a Generic Security Services Application Program Interface (GSSAPI) authentication abort response.

Important: F5 disables GSSAPI by default, although some third-party platforms have GSSAPI enabled.

The authentication abort response is issued when GSSAPI is enabled and a user attempts to log in a certain number of times using an incorrect password. Remote attackers can use thisauthentication abort response to validate whether the username exists on the system.

Information about this advisory is available at the following location:

<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5052&gt;

Note: This link takes you to a resource outside of AskF5, and it is possible that the information may be removed without our knowledge.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.021 Low

EPSS

Percentile

87.8%