First published: Mon May 21 2007(Updated: )
OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | ||
NetApp SteelStore Cloud Integrated Storage | ||
NetApp SolidFire & HCI Storage Node | ||
NetApp SolidFire & HCI Management Node | ||
NetApp HCI Storage Nodes |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2768 has a medium severity level due to the information disclosure risk it poses.
To fix CVE-2007-2768, you should upgrade to the latest version of OpenSSH that addresses this vulnerability.
CVE-2007-2768 affects OpenSSH and various NetApp products utilizing OPIE for PAM.
CVE-2007-2768 allows attackers to infer the existence of user accounts based on different response times for valid and invalid account queries.
A temporary workaround for CVE-2007-2768 is to disable one-time password authentication until a patch is applied.