← Volver a CVEs
CVE-2009-1273
N/ADescripcion
pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado4/8/2009
Ultima modificacion4/23/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
andrew_j.korty:pam_ssh
Debilidades (CWE)
CWE-255
Referencias
http://bugs.gentoo.org/show_bug.cgi?id=263579(cve@mitre.org)
http://secunia.com/advisories/34536(cve@mitre.org)
http://secunia.com/advisories/34986(cve@mitre.org)
http://bugs.gentoo.org/show_bug.cgi?id=263579(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34536(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/34986(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00116.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00145.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.