It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2659 | Issue Tracking Patch Third Party Advisory |
https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2659 | Issue Tracking Patch Third Party Advisory |
https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.3 |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2659 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86 - Patch, Third Party Advisory |
Information
Published : 2019-03-21 15:59
Updated : 2024-11-21 03:23
NVD link : CVE-2017-2659
Mitre link : CVE-2017-2659
CVE.ORG link : CVE-2017-2659
JSON object : View
Products Affected
dropbear_ssh_project
- dropbear_ssh