OpenSSH 4.6 and previous versions, when ChallengeResponseAuthentication is enabled, allows remote malicious users to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openbsd openssh 2.1 |
||
openbsd openssh 2.1.1 |
||
openbsd openssh 2.9.9 |
||
openbsd openssh 2.9.9p2 |
||
openbsd openssh 3.0p1 |
||
openbsd openssh 3.1 |
||
openbsd openssh 3.3p1 |
||
openbsd openssh 3.4 |
||
openbsd openssh 3.6.1p2 |
||
openbsd openssh 3.7 |
||
openbsd openssh 3.9.1 |
||
openbsd openssh 3.9.1p1 |
||
openbsd openssh 4.3 |
||
openbsd openssh 4.3p1 |
||
openbsd openssh 1.2.27 |
||
openbsd openssh 1.2.3 |
||
openbsd openssh 2.5.2 |
||
openbsd openssh 2.9 |
||
openbsd openssh 3.0.2 |
||
openbsd openssh 3.0.2p1 |
||
openbsd openssh 3.2.3p1 |
||
openbsd openssh 3.3 |
||
openbsd openssh 3.6.1 |
||
openbsd openssh 3.6.1p1 |
||
openbsd openssh 3.8.1p1 |
||
openbsd openssh 3.9 |
||
openbsd openssh 4.2 |
||
openbsd openssh 4.2p1 |
||
openbsd openssh 4.6 |
||
openbsd openssh 1.2 |
||
openbsd openssh 2.2 |
||
openbsd openssh 2.3 |
||
openbsd openssh 2.9p1 |
||
openbsd openssh 2.9p2 |
||
openbsd openssh 3.0 |
||
openbsd openssh 3.1p1 |
||
openbsd openssh 3.2 |
||
openbsd openssh 3.4p1 |
||
openbsd openssh 3.5 |
||
openbsd openssh 3.7.1 |
||
openbsd openssh 3.7.1p1 |
||
openbsd openssh 3.7.1p2 |
||
openbsd openssh 4.0 |
||
openbsd openssh 4.0p1 |
||
openbsd openssh 4.3p2 |
||
openbsd openssh 4.4 |
||
openbsd openssh 1.2.1 |
||
openbsd openssh 1.2.2 |
||
openbsd openssh 2.5 |
||
openbsd openssh 2.5.1 |
||
openbsd openssh 3.0.1 |
||
openbsd openssh 3.0.1p1 |
||
openbsd openssh 3.2.2 |
||
openbsd openssh 3.2.2p1 |
||
openbsd openssh 3.5p1 |
||
openbsd openssh 3.6 |
||
openbsd openssh 3.8 |
||
openbsd openssh 3.8.1 |
||
openbsd openssh 4.1 |
||
openbsd openssh 4.1p1 |
||
openbsd openssh 4.4p1 |
||
openbsd openssh 4.5 |