Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
2018-08-28T08:29:00.207
2024-11-21T03:51:43.110
Modified
CVSSv3.0: 5.3 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | openbsd | openssh | ≤ 7.8 | Yes |
Application | netapp | cloud_backup | - | Yes |
Application | netapp | data_ontap_edge | - | Yes |
Application | netapp | ontap_select_deploy | - | Yes |
Application | netapp | steelstore | - | Yes |
Operating System | netapp | cn1610_firmware | - | Yes |
Hardware | netapp | cn1610 | - | No |