Lucene search

K
ubuntuUbuntuUSN-34-1
HistoryNov 30, 2004 - 12:00 a.m.

OpenSSH information leakage

2004-11-3000:00:00
ubuntu.com
49

6.6 Medium

AI Score

Confidence

High

0.065 Low

EPSS

Percentile

93.7%

Releases

  • Ubuntu 4.10

Details

@Mediaservice.net discovered two information leaks in the OpenSSH
server. When using password authentication, an attacker could
test whether a login name exists by measuring the time between
failed login attempts, i. e. the time after which the “password:”
prompt appears again.

A similar issue affects systems which do not allow root logins over
ssh (“PermitRootLogin no”). By measuring the time between login
attempts an attacker could check whether a given root password is
correct. This allowed determining weak root passwords using a brute
force attack.

OSVersionArchitecturePackageVersionFilename
Ubuntu4.10noarchopenssh-server< *UNKNOWN