5
CVSSv2

CVE-2009-1273

Published: 08/04/2009 Updated: 13/05/2009
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote malicious users to enumerate usernames.

Vulnerable Product Search on Vulmon Subscribe to Product

andrew j.korty pam ssh 1.92

Vendor Advisories

Debian Bug report logs - #535877 CVE-2009-1273: user enumeration issue in libpam-ssh Package: libpam-ssh; Maintainer for libpam-ssh is Jerome Benoit <calculus@rezozernet>; Source for libpam-ssh is src:libpam-ssh (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode> Date: Sun, 5 Jul 2009 18:36:01 UTC ...