← Voltar para CVEs
CVE-2009-1273
N/ADescricao
pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado4/8/2009
Ultima modificacao4/23/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
andrew_j.korty:pam_ssh
Fraquezas (CWE)
CWE-255
Referencias
http://bugs.gentoo.org/show_bug.cgi?id=263579(cve@mitre.org)
http://secunia.com/advisories/34536(cve@mitre.org)
http://secunia.com/advisories/34986(cve@mitre.org)
http://bugs.gentoo.org/show_bug.cgi?id=263579(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34536(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34986(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00116.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00145.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.