[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request -- bibtex, pam_ssh
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2009-04-08 18:00:38
Message-ID: Pine.GSO.4.51.0904081400340.29367 () faron ! mitre ! org
[Download RAW message or body]


======================================================
Name: CVE-2009-1273
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1273
Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=263579
Reference: SECUNIA:34536
Reference: URL:http://secunia.com/advisories/34536

pam_ssh 1.92 and possibly other versions, as used when PAM is compiled
with USE=ssh, generates different error messages depending on whether
the username is valid or invalid, which makes it easier for remote
attackers to enumerate usernames.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic