← Back to CVEs
CVE-2009-1273
N/ADescription
pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.
CVE Details
CVSS v3.1 ScoreN/A
Published4/8/2009
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
andrew_j.korty:pam_ssh
Weaknesses (CWE)
CWE-255
References
http://bugs.gentoo.org/show_bug.cgi?id=263579(cve@mitre.org)
http://secunia.com/advisories/34536(cve@mitre.org)
http://secunia.com/advisories/34986(cve@mitre.org)
http://bugs.gentoo.org/show_bug.cgi?id=263579(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34536(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34986(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00116.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00145.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.