what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

CVE-2018-15473

Status Candidate

Overview

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.

Related Files

SSH Username Enumeration
Posted Sep 1, 2024
Authored by Michal Sajdak, wvu, Qualys, Dariusz Tytko, kenkeiras | Site metasploit.com

This Metasploit module uses a malformed packet or timing attack to enumerate users on an OpenSSH server. The default action sends a malformed (corrupted) SSH_MSG_USERAUTH_REQUEST packet using public key authentication (must be enabled) to enumerate users. On some versions of OpenSSH under some configurations, OpenSSH will return a "permission denied" error for an invalid user faster than for a valid user, creating an opportunity for a timing attack to enumerate users. Testing note: invalid users were logged, while valid users were not. YMMV.

tags | exploit
advisories | CVE-2003-0190, CVE-2006-5229, CVE-2016-6210, CVE-2018-15473
SHA-256 | 1ffbd9886232ee7c1bbcfa4f8a71da9745e371936b0cb186036866d08b29bde5
Ubuntu Security Notice USN-3809-2
Posted Aug 12, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3809-2 - USN-3809-1 fixed vulnerabilities in OpenSSH. The update for CVE-2018-15473 was incomplete and could introduce a regression in certain environments. This update fixes the problem. Robert Swiecki discovered that OpenSSH incorrectly handled certain messages. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. It was discovered that OpenSSH incorrectly handled certain requests. An attacker could possibly use this issue to access sensitive information. Various other issues were also addressed.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
advisories | CVE-2016-10708, CVE-2018-15473
SHA-256 | bbf5618081288ef9f000d1c20b8bcd450a9fedd47655c41a8c2f028a9adbe2a3
Red Hat Security Advisory 2019-2143-01
Posted Aug 6, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2143-01 - OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. A user enumeration issue has been addressed.

tags | advisory, protocol
systems | linux, redhat, unix
advisories | CVE-2018-15473
SHA-256 | c854de43ca637e60fab4cde71bfb15f7bca9bd87fdb75a7b653e028e13bf89d8
Red Hat Security Advisory 2019-0711-01
Posted Apr 9, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0711-01 - OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. A user enumeration vulnerability has been addressed.

tags | advisory, protocol
systems | linux, redhat, unix
advisories | CVE-2018-15473
SHA-256 | 17d482361c54b18db02df6f946c0410ecfdce8f4d95c51ec96f5bb8b8671bbce
OpenSSH User Enumeration
Posted Dec 5, 2018
Authored by Matthew Daley, Justin Gardner, Lee David Painter

OpenSSH versions prior to 7.7 suffer from a user enumeration vulnerability.

tags | exploit
advisories | CVE-2018-15473
SHA-256 | 4859577142cc1049d3959af66839a236a04781ada4ed91ed9ebe565b43f98029
Ubuntu Security Notice USN-3809-1
Posted Nov 6, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3809-1 - Robert Swiecki discovered that OpenSSH incorrectly handled certain messages. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. It was discovered that OpenSSH incorrectly handled certain requests. An attacker could possibly use this issue to access sensitive information. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2016-10708, CVE-2018-15473
SHA-256 | a84cfe92dbfe11614adbc141355e26a2d23aae9a63b987c3e12f8f9574c9b486
Gentoo Linux Security Advisory 201810-03
Posted Oct 7, 2018
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201810-3 - A vulnerability in OpenSSH might allow remote attackers to determine valid usernames. Versions less than 7.7_p1-r8 are affected.

tags | advisory, remote
systems | linux, gentoo
advisories | CVE-2018-15473
SHA-256 | 4eaeadcd0ccfca140343f9021fc9940509d2cb19aa94d8936aad31440773226b
Debian Security Advisory 4280-1
Posted Aug 22, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4280-1 - Dariusz Tytko, Michal Sajdak and Qualys Security discovered that OpenSSH, an implementation of the SSH protocol suite, was prone to a user enumeration vulnerability. This would allow a remote attacker to check whether a specific user account existed on the target server.

tags | advisory, remote, protocol
systems | linux, debian
advisories | CVE-2018-15473
SHA-256 | 2ed45514e65d9fdb3cbf5ee545aebf49a71c01525b82238042764a8d74bf6efd
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close