Lucene search

K
ubuntuUbuntuUSN-34-1
HistoryNov 30, 2004 - 12:00 a.m.

OpenSSH information leakage

2004-11-3000:00:00
ubuntu.com
56

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.6

Confidence

High

EPSS

0.049

Percentile

92.9%

Releases

  • Ubuntu 4.10

Details

@Mediaservice.net discovered two information leaks in the OpenSSH
server. When using password authentication, an attacker could
test whether a login name exists by measuring the time between
failed login attempts, i. e. the time after which the “password:”
prompt appears again.

A similar issue affects systems which do not allow root logins over
ssh (“PermitRootLogin no”). By measuring the time between login
attempts an attacker could check whether a given root password is
correct. This allowed determining weak root passwords using a brute
force attack.

OSVersionArchitecturePackageVersionFilename
Ubuntu4.10noarchopenssh-server< *UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

6.6

Confidence

High

EPSS

0.049

Percentile

92.9%