5
CVSSv2

CVE-2003-0190

Published: 12/05/2003 Updated: 15/02/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 515
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

OpenSSH-portable (OpenSSH) 3.6.1p1 and previous versions with PAM support enabled immediately sends an error message when a user does not exist, which allows remote malicious users to determine valid usernames via a timing attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh

openbsd openssh 3.6.1

openpkg openpkg 1.3

openpkg openpkg 1.2

siemens scalance_x204rna_ecc_firmware

siemens scalance_x204rna_firmware

Vendor Advisories

@Mediaservicenet discovered two information leaks in the OpenSSH server When using password authentication, an attacker could test whether a login name exists by measuring the time between failed login attempts, i e the time after which the “password:” prompt appears again ...

Exploits

Portable OpenSSH versions 361p-PAM / 41-SUSE and below timing attack exploit ...
/* * SSH_BRUTE - OpenSSH/PAM <= 361p1 remote users discovery tool * Copyright (c) 2003 @ Mediaservicenet Srl All rights reserved * * * Vulnerability discovered by Marco Ivaldi <raptor@mediaservicenet> * Proof of concept code by Maurizio Agazzini <inode@mediaservicenet> * * Tested against Red Hat, Mandrake, and Debian GNU/Linux ...
#!/bin/bash # # $Id: raptor_sshtime,v 11 2007/02/13 16:38:57 raptor Exp $ # # raptor_sshtime - [Open]SSH remote timing attack exploit # Copyright (c) 2006 Marco Ivaldi <raptor@0xdeadbeefinfo> # # OpenSSH-portable 361p1 and earlier with PAM support enabled immediately # sends an error message when a user does not exist, which allows remo ...
#!/bin/sh # OpenSSH <= 36p1 - User Identification # Nicolas Couture - nc@stormvaultnet # # Description: # -Tells you wether or not a user exist on # a distant server running OpenSSH # # Usage: # -You NEED to have the host's public key # before executing this script # #=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-# # Fact Sheet: ...