CVE-2007-2768

SOURCE - nist

Summary

OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

EPSS Score: 0.00261 (0.657)

Common Weakness Enumeration (CWE)

SOURCE - nist

Exposure of Sensitive Information to an Unauthorized Actor


debian

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow
PackageTypeOS NameOS VersionAffected RangesFix Versions
debian/opensshdebdebian12>=1:9.2p1-2+deb12u2Not yet available
debian/opensshdebdebian11>=1:8.4p1-5+deb11u3Not yet available
debian/opensshdebdebian10>=1:7.9p1-10+deb10u2Not yet available
debian/opensshdebdebianunstable>=1:9.7p1-5Not yet available
debian/opensshdebdebian13>=1:9.7p1-5Not yet available

Severity and metrics

No CVSS data available from this source.

nist

CREATED


UPDATED



EXPLOITABILITY SCORE

8.6


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

4.3medium

ubuntu

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow

redhat

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM SOURCE