Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2003-0190 | First vendor Publication | 2003-05-12 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0190 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-203 | Information Exposure Through Discrepancy |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:445 | |||
Oval ID: | oval:org.mitre.oval:def:445 | ||
Title: | OpenSSH Indirect User Disclosure Vulnerability | ||
Description: | OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0190 | Version: | 4 |
Platform(s): | Red Hat Linux 9 | Product(s): | OpenSSH |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2007-02-13 | Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit |
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for OpenSSH File : nvt/sles9p5019997.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
2140 | OpenSSH w/ PAM Username Validity Timing Attack OpenSSH portable contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when PAM is enabled; remote users can determine which usernames are valid by looking at the relative time it takes to receive an error response from the system. When PAM is enabled, OpenSSH returns an error almost immediately if a user does not exist, and is slower if the user exists but the password is incorrect. This disparity in timing will disclose when the attacker hits upon a valid username, making brute-force username/password guessing easier and resulting in a loss of confidentiality. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-08-29 | Name : The SSH service running on the remote host has an information disclosure vuln... File : sunssh_plaintext_recovery.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-34-1.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-224.nasl - Type : ACT_GATHER_INFO |
2003-05-06 | Name : It is possible to enumerate valid users on the remote host. File : openssh_pam_timing.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:31 |
|
2024-11-28 12:05:31 |
|
2024-08-03 01:02:12 |
|
2024-08-02 12:02:27 |
|
2024-08-02 01:01:25 |
|
2024-02-15 21:28:27 |
|
2024-02-02 01:02:14 |
|
2024-02-01 12:01:26 |
|
2023-09-05 12:02:08 |
|
2023-09-05 01:01:17 |
|
2023-09-02 12:02:09 |
|
2023-09-02 01:01:17 |
|
2023-08-12 12:02:37 |
|
2023-08-12 01:01:18 |
|
2023-08-11 12:02:14 |
|
2023-08-11 01:01:19 |
|
2023-08-06 12:02:03 |
|
2023-08-06 01:01:18 |
|
2023-08-04 12:02:07 |
|
2023-08-04 01:01:19 |
|
2023-07-14 12:02:06 |
|
2023-07-14 01:01:19 |
|
2023-03-29 01:02:04 |
|
2023-03-28 12:01:24 |
|
2022-12-13 17:27:48 |
|
2022-10-11 12:01:52 |
|
2022-10-11 01:01:11 |
|
2022-08-05 12:01:58 |
|
2021-05-04 12:01:58 |
|
2021-04-22 01:02:08 |
|
2020-05-23 13:16:43 |
|
2020-05-23 00:15:22 |
|
2017-10-11 09:23:16 |
|
2016-10-18 12:01:09 |
|
2016-04-26 12:31:03 |
|
2014-02-17 10:25:56 |
|
2013-05-11 11:50:50 |
|