← Retour aux CVEs
CVE-2009-1273
N/ADescription
pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.
Details CVE
Score CVSS v3.1N/A
Publie4/8/2009
Derniere modification4/23/2026
Sourcenvd
Observations honeypot0
Produits affectes
andrew_j.korty:pam_ssh
Faiblesses (CWE)
CWE-255
References
http://bugs.gentoo.org/show_bug.cgi?id=263579(cve@mitre.org)
http://secunia.com/advisories/34536(cve@mitre.org)
http://secunia.com/advisories/34986(cve@mitre.org)
http://bugs.gentoo.org/show_bug.cgi?id=263579(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34536(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34986(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00116.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00145.html(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.