Lucene search

K
ubuntuUbuntuUSN-34-1
HistoryNov 30, 2004 - 12:00 a.m.

OpenSSH information leakage

2004-11-3000:00:00
ubuntu.com
47

6.6 Medium

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.065 Low

EPSS

Percentile

93.6%

Releases

  • Ubuntu 4.10

Details

@Mediaservice.net discovered two information leaks in the OpenSSH
server. When using password authentication, an attacker could
test whether a login name exists by measuring the time between
failed login attempts, i. e. the time after which the “password:”
prompt appears again.

A similar issue affects systems which do not allow root logins over
ssh (“PermitRootLogin no”). By measuring the time between login
attempts an attacker could check whether a given root password is
correct. This allowed determining weak root passwords using a brute
force attack.

OSVersionArchitecturePackageVersionFilename
Ubuntu4.10noarchopenssh-server< *UNKNOWN

6.6 Medium

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.065 Low

EPSS

Percentile

93.6%