First published: Wed Mar 20 2019(Updated: )
It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dropbear SSH | <2013.59 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2659 has a medium severity level due to its potential impact on unauthorized access attempts.
To fix CVE-2017-2659, update Dropbear SSH to version 2013.59 or later.
The main issue in CVE-2017-2659 is the leaking of username validity during GSSAPI authentication, which can incorrectly affect account lockout policies.
Dropbear SSH versions prior to 2013.59 are affected by CVE-2017-2659.
No, CVE-2017-2659 is not classified as a critical vulnerability, but it poses risks that should be addressed promptly.