OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
Exposure of Sensitive Information to an Unauthorized Actor
-
Package | Type | OS Name | OS Version | Affected Ranges | Fix Versions |
---|---|---|---|---|---|
debian/openssh | deb | debian | 12 | >=1:9.2p1-2+deb12u2 | Not yet available |
debian/openssh | deb | debian | unstable | >=1:9.7p1-5 | Not yet available |
debian/openssh | deb | debian | 11 | >=1:8.4p1-5+deb11u3 | Not yet available |
debian/openssh | deb | debian | 13 | >=1:9.7p1-5 | Not yet available |
debian/openssh | deb | debian | 10 | >=1:7.9p1-10+deb10u2 | Not yet available |
Severity and metrics
No CVSS data available from this source.
3.9
3.9
2.2
-
-