SSH server (sshd2) prior to 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote malicious user to guess the password without showing up in the audit logs.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ssh ssh2 2.0.5 |
||
ssh ssh2 2.0.6 |
||
ssh ssh2 2.0.3 |
||
ssh ssh2 2.0.4 |
||
ssh ssh2 2.0.11 |
||
ssh ssh2 2.0.2 |
||
ssh ssh2 2.0.9 |
||
ssh ssh2 2.0 |
||
ssh ssh2 2.0.1 |
||
ssh ssh2 2.0.10 |
||
ssh ssh2 2.0.7 |
||
ssh ssh2 2.0.8 |