First published: Tue Oct 10 2006(Updated: )
OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =4.1 | |
SUSE Linux | ||
All of | ||
OpenSSH | =4.1 | |
SUSE Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5229 is considered a medium severity vulnerability primarily due to its potential to expose valid usernames through timing discrepancies.
To mitigate CVE-2006-5229, update OpenSSH to a version later than 4.1 or implement rate-limiting on login attempts.
CVE-2006-5229 affects OpenSSH portable 4.1 on SUSE Linux and potentially other platforms and versions under specific configurations.
CVE-2006-5229 is classified as an information disclosure vulnerability due to the timing attack that reveals valid usernames.
Yes, CVE-2006-5229 can be exploited remotely by attackers to determine valid usernames on the affected systems.