First published: Wed Dec 31 2003(Updated: )
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openssh | =2 | |
Openbsd Openssh | =3.2.2 | |
Openbsd Openssh | =3.1 | |
Openbsd Openssh | =3.0.2p1 | |
Openbsd Openssh | =1.5.8 | |
Openbsd Openssh | =2.1.1 | |
Openbsd Openssh | =3.2.3p1 | |
Openbsd Openssh | =3.1p1 | |
Openbsd Openssh | =2.5.1 | |
Openbsd Openssh | =2.9.9p2 | |
Openbsd Openssh | =3.6.1p2 | |
Openbsd Openssh | =3.0 | |
Openbsd Openssh | =1.2.1 | |
Openbsd Openssh | =2.2 | |
Openbsd Openssh | =2.1 | |
Openbsd Openssh | =3.0.2 | |
Openbsd Openssh | =3.2.2p1 | |
Openbsd Openssh | =3.3 | |
Openbsd Openssh | =2.3.1 | |
Openbsd Openssh | =3.2 | |
Openbsd Openssh | =1.2.3 | |
Openbsd Openssh | =3.4p1 | |
Openbsd Openssh | =3.5p1 | |
Openbsd Openssh | =1.2 | |
Openbsd Openssh | =1.5.7 | |
Openbsd Openssh | =3.0.1p1 | |
Openbsd Openssh | =3.6 | |
Openbsd Openssh | =2.5.2 | |
Openbsd Openssh | =2.9.9 | |
Openbsd Openssh | =3.0.1 | |
Openbsd Openssh | =3.6.1 | |
Openbsd Openssh | =2.3 | |
Openbsd Openssh | =2.5 | |
Openbsd Openssh | =3.0p1 | |
Openbsd Openssh | =1.2.27 | |
Openbsd Openssh | =2.9p1 | |
Openbsd Openssh | =3.4 | |
Openbsd Openssh | =3.5 | |
Openbsd Openssh | =1.2.2 | |
Openbsd Openssh | =2.9 | |
Openbsd Openssh | =3.3p1 | |
Openbsd Openssh | =3.6.1p1 | |
Openbsd Openssh | =1.3 | |
Openbsd Openssh | =1.5 | |
Openbsd Openssh | =2.9p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.