Project

General

Profile

Bug #9320

Bug #9316: openssh: User enumeration via malformed packets in authentication requests (CVE-2018-15473)

[3.6] openssh: User enumeration via malformed packets in authentication requests (CVE-2018-15473)

Added by Alicha CH 4 months ago. Updated 3 months ago.

Status:
Closed
Priority:
Normal
Assignee:
Category:
Security
Target version:
Start date:
08/22/2018
Due date:
% Done:

100%

Estimated time:
Affected versions:
Security IDs:

Description

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for
an invalid authenticating user until after the packet containing the request has been fully parsed,
related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.

References:

http://www.openwall.com/lists/oss-security/2018/08/15/5
https://nvd.nist.gov/vuln/detail/CVE-2018-15473

Patch:

https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0

Associated revisions

Revision 806a3280 (diff)
Added by Natanael Copa 3 months ago

main/openssh: backport security fix (CVE-2018-15473)

fixes #9320

History

#1 Updated by Natanael Copa 3 months ago

  • Target version changed from 3.6.3 to 3.6.4

#2 Updated by Natanael Copa 3 months ago

  • Status changed from New to Resolved
  • % Done changed from 0 to 100

#3 Updated by Alicha CH 3 months ago

  • Project changed from Alpine Security to Alpine Linux
  • Category set to Security
  • Status changed from Resolved to Closed
  • Security IDs deleted (CVE-2018-15473)

Also available in: Atom PDF