|
|
Subscribe / Log in / New account

openssh: user enumeration via timing side-channel

Package(s):openssh CVE #(s):CVE-2016-6210
Created:July 21, 2016 Updated:August 2, 2016
Description: From the Red Hat bugzilla entry:

When SSHD tries to authenticate a non-existing user, it will pick up a fake password structure hardcoded in the SSHD source code. On this hard coded password structure the password hash is based on BLOWFISH ($2) algorithm. If real users passwords are hashed using SHA256/SHA512, then sending large passwords (10KB) will result in shorter response time from the server for non-existing users. This allows remote attacker to enumerate existing users on system logging via SSHD.

Alerts:
openSUSE openSUSE-SU-2016:2339-1 openssh 2016-09-19
Mageia MGASA-2016-0280 openssh 2016-08-31
Ubuntu USN-3061-1 openssh 2016-08-15
Slackware SSA:2016-219-03 openssh 2016-08-06
Arch Linux ASA-201608-1 openssh 2016-08-02
Debian-LTS DLA-578-1 openssh 2016-07-30
Debian DSA-3626-1 openssh 2016-07-24
Fedora FEDORA-2016-7440fa5ce2 openssh 2016-07-20
Gentoo 201612-18 openssh 2016-12-07

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds