First published: Fri May 02 2003(Updated: )
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =3.4p1 | |
OpenSSH | =3.6.1p1 | |
OpenSSH | <3.6.1 | |
OpenSSH | =3.6.1-p1 | |
openpkg openpkg | =1.2 | |
openpkg openpkg | =1.3 | |
All of | ||
Siemens Scalance X204RNA ECC | <3.2.7 | |
Siemens Scalance X204RNA ECC Firmware | ||
All of | ||
Siemens Scalance X204RNA EEC Firmware | <3.2.7 | |
Siemens Scalance X204RNA EEC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0190 is classified as a medium-severity vulnerability due to the potential for remote attackers to enumerate valid usernames.
To mitigate CVE-2003-0190, upgrade to OpenSSH version 3.6.2 or later where this timing attack issue has been addressed.
CVE-2003-0190 affects OpenSSH versions up to and including 3.6.1p1, particularly when PAM support is enabled.
Organizations using vulnerable versions of OpenSSH with PAM enabled are susceptible to the enumeration of valid usernames.
CVE-2003-0190 utilizes a timing attack to determine the existence of valid usernames on the affected OpenSSH versions.