Vulnerability Name: | CVE-2006-5229 (CCN-40587) | ||||||||
Assigned: | 2006-10-09 | ||||||||
Published: | 2006-10-09 | ||||||||
Updated: | 2018-10-17 | ||||||||
Summary: | OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. Note: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds. | ||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.3 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:UR)
2.3 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-200 | ||||||||
Vulnerability Consequences: | Other | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Mon Oct 09 2006 - 05:33:05 CDT yet another OpenSSH timing leak? Source: MITRE Type: CNA CVE-2006-5229 Source: CCN Type: SA25979 Proventia GX5108 and GX5008 Cross-Site Scripting and File Inclusion Source: SECUNIA Type: Vendor Advisory 25979 Source: CCN Type: OpenSSH Web site OpenSSH Source: OSVDB Type: UNKNOWN 32721 Source: CCN Type: OSVDB ID: 32721 OpenSSH Username Password Complexity Account Enumeration Source: BUGTRAQ Type: UNKNOWN 20061009 yet another OpenSSH timing leak? Source: BUGTRAQ Type: UNKNOWN 20061009 Re: yet another OpenSSH timing leak? Source: BUGTRAQ Type: UNKNOWN 20061010 Re: yet another OpenSSH timing leak? Source: BUGTRAQ Type: UNKNOWN 20061014 Re: yet another OpenSSH timing leak? Source: BID Type: UNKNOWN 20418 Source: CCN Type: BID-20418 OpenSSH-Portable Existing Password Remote Information Disclosure Weakness Source: MISC Type: UNKNOWN http://www.sybsecurity.com/hack-proventia-1.pdf Source: VUPEN Type: Vendor Advisory ADV-2007-2545 Source: XF Type: UNKNOWN openssh-username-weak-security(40587) Source: CCN Type: Rapid7 Vulnerability and Exploit Database [05-30-2018] SSH Username Enumeration | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |