CVE-2003-0190

OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
References
Link Resource
http://lab.mediaservice.net/advisory/2003-01-openssh.txt Broken Link
http://lists.grok.org.uk/pipermail/full-disclosure/2003-April/004815.html Broken Link
http://marc.info/?l=bugtraq&m=105172058404810&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=106018677302607&w=2 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2003-222.html Broken Link
http://www.redhat.com/support/errata/RHSA-2003-224.html Broken Link
http://www.securityfocus.com/bid/7467 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.turbolinux.com/security/TLSA-2003-31.txt Broken Link
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A445 Broken Link
http://lab.mediaservice.net/advisory/2003-01-openssh.txt Broken Link
http://lists.grok.org.uk/pipermail/full-disclosure/2003-April/004815.html Broken Link
http://marc.info/?l=bugtraq&m=105172058404810&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=106018677302607&w=2 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2003-222.html Broken Link
http://www.redhat.com/support/errata/RHSA-2003-224.html Broken Link
http://www.securityfocus.com/bid/7467 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.turbolinux.com/security/TLSA-2003-31.txt Broken Link
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A445 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6.1:p1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
cpe:2.3:a:openpkg:openpkg:1.3:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:scalance_x204rna_ecc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x204rna_ecc:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:scalance_x204rna_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:scalance_x204rna:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2003-05-12 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2003-0190

Mitre link : CVE-2003-0190

CVE.ORG link : CVE-2003-0190


JSON object : View

Products Affected

openbsd

  • openssh

siemens

  • scalance_x204rna_firmware
  • scalance_x204rna_ecc_firmware
  • scalance_x204rna
  • scalance_x204rna_ecc

openpkg

  • openpkg
CWE
CWE-203

Observable Discrepancy