CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
80.7%
OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.
Vendor | Product | Version | CPE |
---|---|---|---|
openbsd | openssh | 1.2 | cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:* |
openbsd | openssh | 1.2.1 | cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:* |
openbsd | openssh | 1.2.2 | cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:* |
openbsd | openssh | 1.2.3 | cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:* |
openbsd | openssh | 1.2.27 | cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:* |
openbsd | openssh | 2.1 | cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:* |
openbsd | openssh | 2.1.1 | cpe:2.3:a:openbsd:openssh:2.1.1:*:*:*:*:*:*:* |
openbsd | openssh | 2.2 | cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:* |
openbsd | openssh | 2.3 | cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:* |
openbsd | openssh | 2.5 | cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:* |
lists.grok.org.uk/pipermail/full-disclosure/2007-April/053906.html
lists.grok.org.uk/pipermail/full-disclosure/2007-April/053951.html
securityreason.com/securityalert/2631
www.osvdb.org/34600
www.securityfocus.com/bid/23601
exchange.xforce.ibmcloud.com/vulnerabilities/33794
security.netapp.com/advisory/ntap-20191107-0003/