5
CVSSv2

CVE-2003-0190

Published: 12/05/2003 Updated: 15/02/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 515
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

OpenSSH-portable (OpenSSH) 3.6.1p1 and previous versions with PAM support enabled immediately sends an error message when a user does not exist, which allows remote malicious users to determine valid usernames via a timing attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openssh

openbsd openssh 3.6.1

openpkg openpkg 1.3

openpkg openpkg 1.2

siemens scalance x204rna ecc firmware

siemens scalance x204rna firmware

Vendor Advisories

@Mediaservicenet discovered two information leaks in the OpenSSH server When using password authentication, an attacker could test whether a login name exists by measuring the time between failed login attempts, i e the time after which the “password:” prompt appears again ...

Exploits

Portable OpenSSH versions 361p-PAM / 41-SUSE and below timing attack exploit ...
/* * SSH_BRUTE - OpenSSH/PAM <= 361p1 remote users discovery tool * Copyright (c) 2003 @ Mediaservicenet Srl All rights reserved * * * Vulnerability discovered by Marco Ivaldi <raptor@mediaservicenet> * Proof of concept code by Maurizio Agazzini <inode@mediaservicenet> * * Tested against Red Hat, Mandrake, and Debian GNU/Linux ...
#!/bin/bash # # $Id: raptor_sshtime,v 11 2007/02/13 16:38:57 raptor Exp $ # # raptor_sshtime - [Open]SSH remote timing attack exploit # Copyright (c) 2006 Marco Ivaldi <raptor@0xdeadbeefinfo> # # OpenSSH-portable 361p1 and earlier with PAM support enabled immediately # sends an error message when a user does not exist, which allows remo ...
#!/bin/sh # OpenSSH <= 36p1 - User Identification # Nicolas Couture - nc@stormvaultnet # # Description: # -Tells you wether or not a user exist on # a distant server running OpenSSH # # Usage: # -You NEED to have the host's public key # before executing this script # #=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-# # Fact Sheet: ...