Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
Exposure of Sensitive Information to an Unauthorized Actor
Exposure of Sensitive Information to an Unauthorized Actor
-
Package | Type | OS Name | OS Version | Affected Ranges | Fix Versions |
---|---|---|---|---|---|
debian/openssh | deb | debian | 12 | >=1:9.2p1-2+deb12u2 | Not yet available |
debian/openssh | deb | debian | unstable | >=1:9.7p1-5 | Not yet available |
debian/openssh | deb | debian | 10 | >=1:7.9p1-10+deb10u2 | Not yet available |
debian/openssh | deb | debian | 13 | >=1:9.7p1-5 | Not yet available |
debian/openssh | deb | debian | 11 | >=1:8.4p1-5+deb11u3 | Not yet available |
Severity and metrics
No CVSS data available from this source.
3.9
3.9
3.9